For the past month or so a curious game has been going on in the world of rumor and uncertainty that passes for the intelligence community. At the heart of it is an attempt to force US President Barack Obama to put cyber security back to the top of his agenda and to usher in increased monitoring of the Internet.
Despite an initial promise of action and a demand for a report on the risks to the US technology infrastructure to be on his desk in 60 days, little in policy terms has been heard since.
Even more frustratingly for the computer-security community, Obama has also not filled the much-trumpeted post of cyber tsar. Melissa Hathaway, the White House’s senior acting director for cyberspace and the author of Obama’s 60-day review of cyber policy, had been widely tipped for the position — but four months ago she resigned, citing personal reasons for her decision.
This appears to have resulted in a turf war between the US department of homeland security, the military and the intelligence community with each competing for responsibility for the issue.
Now, in what is being seen as an attempt to jog Obama’s memory, stories about the US’s vulnerability to cyber attack, the threat it poses to its economy and the potential rise of cyber-terrorism have begun to appear on an almost daily basis.
Senior intelligence officials are suggesting that the US faces a massive risk to its power grid and communications infrastructure — claiming that if current vulnerabilities are exploited there would be enormous economic damage to the US.
“There has been a heightened awareness of our vulnerability to cyber attacks in the US and that has been building for over a year. People are saying: ‘Look at Lehman Brothers’ — if someone had taken out another banking Web site on the same day it would have been the straw that broke the camel’s back,” said Tom Reilly, a US director of ArcSight, a company set up by the investment arm of the CIA.
It draws 30 percent of its revenue from monitoring critical infrastructure for dangerous activity for US federal government agencies and NATO.
On the subject of the cyber tsar, Reilly said: “There is now a lot of impatience ... People are looking for an individual to be appointed to set policy direction and without that framework in place there is the possibility of duplication by agencies.”
The potential for exploiting the fragile confidence in financial institutions has not been lost on businesses.
“The recession has been a driver in awareness,” said William Beer, director of information security practice for PricewaterhouseCoopers. “For the first time, critical infrastructure vulnerability has made it onto the risk register. With Northern Rock we saw a cascade effect occurring as its systems went down ... and the fragility of systems is now seen as important to confidence.”
A particularly audible warning of cyber-terrorism has come from Steven Chabinsky, the deputy assistant director of the FBI’s cyber division. On Nov. 17, he told the Senate judiciary committee that the FBI was now investigating suspected al-Qaeda sympathizers who appear to be interested in launching attacks on critical communications infrastructure.
At the same hearing, US Associate Deputy Attorney General James Baker confirmed the Obama administration had been examining the need to possibly change the laws dealing with both technology and surveillance, in order “to better protect the nation from cyber attacks.”
Stewart Baker (no relation), a former assistant secretary of policy for the department of homeland security, said the concerns were legitimate.
“We have not seen a particular event that has justified this, but the fact is that our exposure to cyber attacks is growing and is growing particularly in power systems because of our move to Internet-based control systems,” said Stewart Baker, who added that the rise in reports was almost certainly an expression of those concerns. “News doesn’t happen without someone wanting it to happen. There is a sense in cyberspace circles that despite the talk that has occurred, and the concerns now being expressed, we are still not addressing the problems.”
Any answer to these problems will come with a hefty political and financial price tag and has no guarantee of eventual success.
“Some of the price will have to be paid in terms of privacy on the Internet, because we are not going to be able to find those wishing to attack us without increased monitoring. That can only be achieved by giving up some of the anonymity that we see on the present Internet,” Stewart Baker said.
Internet monitoring will be difficult to justify politically, because there is little evidence of attacks by terrorists on communications infrastructure — the main use of the Web by terrorist groups to date has been for fundraising, communication and propaganda.
“To attack critical infrastructure, terrorist groups have to have a cyber capability and the terrorists we know don’t,” said Peter Tippett, a noted security threat expert and vice president of intelligence and research for the computer giant Verizon. “Terrorism of cyber quality requires serious skills and another level of sophistication — it’s not just the use of hacking techniques. Our recent data breach survey and all of the information we have shows that in the vast majority of hacking attacks, the bad guys get there by accident.”
“I am confident that most terrorist organizations have a geek somewhere, but the organizations that have the sort of capability necessary to attack infrastructure are the usual suspects — Russia, China and Israel — and they are not the sort of organizations we think of as terrorists,” he said.
This isn’t a position wholly shared by Rohan Gunaratna, head of the Singapore-based International Centre for Political Violence and Terrorism.
“Terrorist groups at the moment prefer to harness the infrastructure, and the capability to mount successful attacks is still within the domain of government, but it is only a question of time before that capability starts to percolate to them,” said Gunaratna, a former White House adviser. “There have been power disruption events in Northern Australia and Canada, where responsibility was claimed by the Abu Hafs [al-Masri] Brigade [though they were not responsible]. The awareness of the vulnerability is being raised because groups are becoming more IT [information technology]-aware.”
Stewart Baker agreed with this possibility, though he also said that IT was treated with suspicion by terrorist groups.
“If a government wanted to experiment with its capability, it might want to use a proxy, but with cyberwarfare you want to have control, and turning over capability to another group is always difficult. This is not like a Stinger missile, you need specialized training — almost a whole career goes into building a cyber warrior,” Stewart Baker said.
“So far, al-Qaeda has been penetrated every time it has used electronic techniques — it knows the network is not your friend,” he said.
Peter Warren is the editor of the Future Intelligence Web site.
I came to Taiwan to pursue my degree thinking that Taiwanese are “friendly,” but I was welcomed by Taiwanese classmates laughing at my friend’s name, Maria (瑪莉亞). At the time, I could not understand why they were mocking the name of Jesus’ mother. Later, I learned that “Maria” had become a stereotype — a shorthand for Filipino migrant workers. That was because many Filipino women in Taiwan, especially those who became house helpers, happen to have that name. With the rapidly increasing number of foreigners coming to Taiwan to work or study, more Taiwanese are interacting, socializing and forming relationships with
Earlier signs suggest that US President Donald Trump’s policy on Taiwan is set to move in a more resolute direction, as his administration begins to take a tougher approach toward America’s main challenger at the global level, China. Despite its deepening economic woes, China continues to flex its muscles, including conducting provocative military drills off Taiwan, Australia and Vietnam recently. A recent Trump-signed memorandum on America’s investment policy was more about the China threat than about anything else. Singling out the People’s Republic of China (PRC) as a foreign adversary directing investments in American companies to obtain cutting-edge technologies, it said
Chinese social media influencer “Yaya in Taiwan” (亞亞在台灣), whose real name is Liu Zhenya (劉振亞), made statements advocating for “reunifying Taiwan [with China] through military force.” After verifying that Liu did indeed make such statements, the National Immigration Agency revoked her dependency-based residency permit. She must now either leave the country voluntarily or be deported. Operating your own page and becoming an influencer require a certain amount of support and user traffic. You must successfully gain approval for your views and attract an audience. Although Liu must leave the country, I cannot help but wonder how many more “Yayas” are still
The recent termination of Tibetan-language broadcasts by Voice of America (VOA) and Radio Free Asia (RFA) is a significant setback for Tibetans both in Tibet and across the global diaspora. The broadcasts have long served as a vital lifeline, providing uncensored news, cultural preservation and a sense of connection for a community often isolated by geopolitical realities. For Tibetans living under Chinese rule, access to independent information is severely restricted. The Chinese government tightly controls media and censors content that challenges its narrative. VOA and RFA broadcasts have been among the few sources of uncensored news available to Tibetans, offering insights