[ISN] Tech threats: the new front in the War on Terror

InfoSec News isn at c4i.org
Thu Sep 2 07:50:58 EDT 2004


http://www.cbc.ca/news/viewpoint/vp_hughes/20040901.html

Greg Hughes 
September 01, 2004

There's little doubt nowadays that the 21st century is shaping up to 
be a very unstable era in human history. Non-state actors like 
al-Qaeda are stepping up their fight against nation-states, employing 
mostly conventional, low-tech solutions to their acts of terrorism. 

Yet there is a new frontier emerging in the War on Terror - cyber 
terrorism. As the internet continues to grow in popularity and usage 
around the globe, more malevolent forces are using the web as a means 
to spark fear and spread their messages of hate and violence. 

Cyber terrorism is a diverse set of technologies that ranges from 
viruses and denial-of-service attacks to posting messages, pictures 
and videos on websites whose purpose is to scare people. 

It's particularly effective in the West because westerners are the 
most connected people in the world. For terrorists, the web offers the 
ability to reach the common people in a way that's uncontrolled and 
unnerving. If a website or virus reaches enough people and incites 
enough chaos, it's a cheap, easy way to scare people on a level 
similar to a "real world" terrorist attack. And you don't even have to 
be in a western country to make it all happen. 

The most obvious example of cyber terrorism so far has been websites 
devoted to westerners held hostage by terrorists in the aftermath of 
the war in Iraq. The videos available on these sites have featured 
content that includes torture and live beheadings - content not 
suitable for any time of day on TV or radio. But online, the curious 
will, eventually, find it. 

More disturbing, however, is that a cyber terrorist attack could, in 
theory, help to create more damage than the events of 9/11 could ever 
have accomplished. 

Here's a potential scenario. Let's say a major city in the U.S. or 
Canada is hit with a terrorist attack similar to the attacks on the 
World Trade Center. The casualties are not as high as 9/11, but many 
people are injured and need help quickly. 

Under normal circumstances, emergency dispatchers would be sending 
medical teams to help the wounded. But what if, at the same time as 
the physical attacks were occurring, an army of viruses with 
instructions to crash communication networks - emergency radio 
frequencies and cellphone radio towers - was deployed from elsewhere? 

This isn't an unfeasible scenario; various viruses such as MyDoom have 
taken down entire networks with relative ease. Who's to say that an 
enterprising, net-savvy terrorist group couldn't make this happen? And 
how many more people could be in trouble because our high-tech 
communication networks are down after the fallout of a major 
explosion? 

The United States, the prime target of many terrorist groups, is 
charged with the greatest burden in making sure cyber terrorism 
scenarios don't actually happen. But it's a tough task, given how 
quickly things can spread online. It only takes one downloaded file, 
one opened e-mail, to spread a virus worldwide in a matter of days. 

BBC News has reported that in July of this year, a U.S. Department of 
Homeland Security internal memo described cyber terrorism as one of 
America's top five security threats. A new unit within the DHS, the 
National Cyber Security Division, was created explicitly for the 
purpose of tackling net security and addressing criticisms that the 
U.S. government has not done a good enough job of preventing future 
cyber terrorist attacks. 

Some have argued that cyber terrorism is hardly a threat in comparison 
to a weapon of mass destruction going off in a major city like Chicago 
or London. Perhaps they're right and talk of cyber terrorism is simply 
fear mongering. But the tools that could enable terrorists to gain 
possession of weapons of mass destruction are already online. And 
technology that allows terrorists to gain information required to 
create these weapons is only improving as the web continues to evolve. 

Quantum encryption - the use of photons as gatekeepers - is one such 
example. While still a few years away from being used for mass-market 
purposes, quantum encryption could be the most impenetrable form of 
encryption ever created. The use of decryption sequences employing 
quantum variables known only to the sender and recipient makes the job 
of intercepting and cracking encrypted e-mails, instant messages and 
websites nearly impossible. This is very worrisome for groups devoted 
to preventing terrorist acts, for how do you stop communications you 
can't even find a source for? 

Various websites have for years offered detailed instructions on 
bomb-making techniques. So-called "darknets" - intranets that have no 
IP addresses listed so they can't be traced - spring up overnight 
where terror groups can share information secretly and disappear 
without a trace. 

Should we be worried? Possibly. Is this a reason to minimize our 
dependence on the web? Not in the least. The internet is becoming the 
tool of choice for many aspects of our lives; abandoning what has 
become one of our greatest inventions would be to give in to fear. Yet 
like most technology, the web is a double-edged sword: for every 
benefit we gain from it, there's an equal trade-off. 

All we can do is be vigilant, be responsible and be educated about the 
web - the better informed we are, the less chance cyber terrorists 
will succeed. 

-=-

Greg Hughes is a 26 year-old freelance writer. He has written on 
culture and technology for Shift, Silicon Valley North and 
globetechnology.com, and he has also contributed to the National Post, 
the Queen's Alumni Review and other publications. He holds a Bachelor 
of Arts (Honours) from Queen's University in Kingston, Ontario.





More information about the ISN mailing list