spacer
spacer spacer spacer spacer spacer spacer spacer spacer
spacer
spacer
spacer
. spacer .
spacer




.
spacer
Tweet
spacer
Commentary: Cyber Pearl Harbor
by Arnaud De Borchgrave
Washington (UPI) Oct 2, 2012
spacer
disclaimer: image is for illustration purposes only

A shadowy hacker group in the Middle East has disrupted the electronic banking operations of some of the United States' largest financial institutions, The Seattle Times reported.

But this is hardly new. Five years ago, Goldman Sachs' chief technology officer reported this venerable financial institution had sustained more than 1 million "intrusion attempts in a single day."

A military cybernaut expert, speaking privately, said the Pentagon sustains up to 6 million such probes a day. How many were successful remains highly classified. But one Pentagon cyber expert said the vast building's internal communications system was disrupted once for 48 hours. The number of hostile hacker penetrations remains top secret.

At Wells Fargo, U.S. Bancorp and Bank of America, the Seattle newspaper reported, a group identifying itself as Izz ad-Din al-Qassam Cyber Fighters attacked their websites and "left customers temporarily unable to access their checking accounts, mortgages and other services."

Electronic crime is a fast-spreading plague. In recent years, there have been massive denial-of-service attacks. Computers are flooded with communications demands that cause systems to back up, seize up and shut down.

These Islamist cyber fighters said their attacks would continue until a video that insults Prophet Muhammad and triggered riots from Indonesia to Pakistan to Egypt to Libya is removed from the Internet. The 15-minute video, the work of a rank amateur, went viral several weeks ago and can no longer be deleted.

Cyber terrorists have been lurking the 'Net a lot longer than the offending video. And critical electronic infrastructure -- from valves that regulate water flows from dams to air traffic control and transnational banking systems -- is vulnerable everywhere.

Israel and the United States have been waging electronic warfare against Iran's secret underground uranium enrichment activities. Clearly, Iran is retaliating by using electronic terrorist groups, both homegrown and Middle Eastern.

In mid-September, the FBI warned of "a new trend in which cyber criminal actors are using spam and phishing emails" as weapons to attack the global networks of financial institutions."

This week, speaking at a Woodrow Wilson International Center meeting devoted to the growing cyber threat, U.S. Army Gen. Keith B. Alexander, chief of the U.S. Cyber Command (also head of the National Security Agency), since it was launched two years ago, said the cyber threat has grown in 10 years "from exploitation to disruption to destruction of computer networks."

Russia understood this when the Soviet Union collapsed. The old Soviet Federal Agency for Government Communications and Information quickly became a cyber command as the new Russian leaders gave priority to one area where they could perhaps compensate for U.S. military and economic superiority.

This gave the Kremlin a two-decade lead over the United States. USCYBERCOM under Alexander wasn't activated until September 2010. China activated a cyber command in the mid-1990s.

This week, Alexander said cyber attacks that would crash stock exchanges and markets "are all possible today." He also said "education is the key to understand what's already happening."

At the same event, U.S. Sen. Susan Collins, R-Maine, ranking member and former chairwoman of the Homeland Security Committee, said "over 200 cyberattacks against our national assets, such as critical water treatment and transportation networks are just the tip of the iceberg."

Collins said she was most concerned about an attack on the nation's electric power grid. The electronic stealing of intellectual property is critical and already with us round the clock.

"Imagine," she said, "if someone had stolen iPhone5 information and got to market first."

Some company intrusions simply plant an electronic spy to monitor -- and steal -- proprietary secrets.

Massive electronic threats follow on the heels of massive physical infrastructure threats -- the vast system of highways, bridges, airports, railroads, pipelines, power lines, dams, waterways, water treatment plants, schools and other publicly owned and publicly regulated facilities, all dangerously neglected as hundreds of billions were spent on two wars in Iraq and Afghanistan.

Iraq was a pure waste of $1 trillion with the net result that Iran now has more influence in Baghdad than Washington. Al-Qaida, terminated by the late Saddam Hussein, is also operating and recruiting in Iraq.

And the Afghan War, now opposed by 70 percent of Americans, where Afghans trained by the United States are killing their U.S. advisers and where the tab has reached $600 billion, appears to be headed for a costly and controversial finish.

If the United States under President Obama or President Romney decides to see the Afghan war through the end of 2014, the total tab will be another $1 trillion. And the U.S. deficit, now at $16 trillion, will continue to grow correspondingly.

2015, and hopefully sooner, should see the beginning of a massive home front surge to restore the United States to its once global grandeur.

Infrastructure needs alone are estimated at $3 trillion over five years. Global vision is blurred today. But the United States' needs in Afghanistan aren't. They are to disengage ASAP.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

Tweet



.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries






.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

spacer
Share this article via these popular social media networks
spacer
spacer del.icio.us spacer Digg spacer Reddit Google

spacer


spacer
spacer Hackers shifting to 'destruction': US cyber chief
Washington (AFP) Oct 1, 2012
Hackers are stepping up the intensity of their attacks, moving from "disruption" to "destruction" of key computer systems, the top US cyber-defense official said Monday. General Keith Alexander, who is director of the National Security Agency and commander of the US Cyber Command, told a Washington forum that the new tactics could move beyond mere annoyances and begin causing severe economic ... read more


spacer
US pushing Gulf nations to develop missile defense

Israel postpones vital Arrow-3 flight test

N. Korea blasts US plan for new radar base in Japan

US to station second X-band missile radar in Japan

spacer
Lockheed Martin's DAGR Missile Demonstrates Ground Launch Capability In Guided Flight Tests

US Army, Navy Demonstrate JLENS' Ability to Defeat Anti-ship Cruise Missile

S. Korea near deal on longer missile range: report

India follows Pakistan with missile test

spacer
US weighing drone strikes in north Africa: report

AUVSI Welcomes Formation of Senate Unmanned Aerial Systems Caucus

The next wave in US robotic war: drones on their own

Europe tipped to spend $14B on drones

spacer
Raytheon to provide Joint Tactical Terminal radios with latest security features to US Navy

Northrop Grumman Awarded Contract to Extend BACN Communications Connectivity to the Tactical Edge

Hughes Awarded Custom SATCOM Solutions Contract by GSA

4 SOPS begins testing newest AEHF satellite

spacer
Lockheed Martin Completes Centralization Of Targets and Countermeasures Operations in Huntsville

US hails war vehicle that saved lives, bypassed bureaucracy

Raytheon MALD-J Decoy Goes 4 for 4 in Operational Flight Tests

Raytheon and PACAF expand the reach of realistic training environments

spacer
EADS/BAE tie-up could face US opposition, analysts say

Leading defence firms 'not transparent enough': study

US charges 11 in Russian military exports ring

Lawmakers looking at BAE-EADS merger plan

spacer
Pentagon chief Panetta heads to Latin America

Outside View: American Exceptionalism

Japan PM adds China balm in cabinet reshuffle

Chinese govt ships enter disputed waters: Japan

spacer
Nano-hillocks: Of mountains and craters

Nanoparticles Glow Through Thick Layer of Tissue

All systems go at the biofactory

Electrons confined inside nano-pyramids


spacer
Tempur-Pedic Mattress Comparison

SPACE MEDIA NETWORK PROMOTIONS
Solar Energy Solutions
Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.