Experts predict major cyberattack coming
Corporate icons could be targets, and trillions of dollars worth of damage is possible
Computerworld - A terrorist-sponsored cyberattack against major U.S. networks and businesses is no longer a question of if, but when and to what extent, according to former senior intelligence and security officials.
Although the laundry list of warnings surrounding possible attacks has left people confused about what to prepare for, many experts with firsthand experience in counterterrorism said plans should be put in place to respond to a conventional bombing or chemical attack against a prominent private U.S. company, which would be followed closely by a cyber- or physical attack against regional communications and power systems to hamper rescue and recovery efforts.
A former senior intelligence official said companies considered American icons, such as General Electric Co., General Motors Corp. or IBM, could find themselves under siege.
The ex-official, who requested anonymity, said it's urgent that secure communications channels be established between CEOs of large multinational companies and government agencies such as local FBI offices.
Despite reports that Osama bin Laden has ordered the direct targeting of U.S. economic symbols, there has been no evidence to suggest that traditional terrorist groups have abandoned bombs and guns for computers, said Eric Shaw, a former CIA profiler who now works at Stroz Associates LLC, a cybercrime consulting firm in New York.
Plot Against Microsoft?
Global corporations, especially ones with ties to India or Israel, are big targets, Shaw said. In fact, he added, shortly after Indian authorities apprehended an al-Qaeda operative who warned of the December 2001 attack against the Indian Parliament, the suspect reportedly confessed to having knowledge of an infiltration operation against Microsoft Corp.
Microsoft spokesman Matt Pilla said the company hasn't been contacted by Indian authorities. But based on an internal security review and the various claims made by the suspect, the company doesn't consider the threat to be credible. However, Pilla said, Microsoft has beefed up both network and physical security around its corporate offices in the wake of Sept. 11.
Microsoft likely wouldn't be the only company targeted by so-called hackers for hire, experts said.
There are thousands of hackers capable of causing significant regional disruptions of the telecommunications and power grids as a way to amplify the effects of a physical attack, according to Stuart McClure, president and chief technology officer of Mission Viejo, Calif.-based Foundstone Inc.
"It's also safe to say that they have the blueprints for the networks," he said.
Jim Williams, director of security solutions at Omaha-based security services company Solutionary Inc. and a former member of the FBI's San Francisco computer-intrusion squad, said the cyberthreats to the nation's telecommunications, power and emergency services systems are
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!