Sales & Marketing
Training & Development
PCs & Servers
Imaging & Printing
Does cyber-terrorism exist?
Jun 24, 2008 3:40 PM
Global security experts gathered in Malaysia last month to help ramp up the world’s defenses against cyber-terrorism
Dubbed by organisers as ‘the largest ministerial-level gathering ever organised about cyber-terrorism’, the World Cyber Security Summit (WCSS), was recenlty held in Malaysia. Hosted by the International Multilateral Partnership Against Cyber-Terrorism (IMPACT), government representatives from all over the globe including Australia joined private sector and prominent security experts. The summit was chaired by Malaysian Prime Minister Dato’ Seri Abdullah Ahmad Badawi with international speakers such as Professor Howard Schmidt, former White House security advisor and former chief security officer at Microsoft and eBay.
They were joined by a multitude of security experts including Mikko Hypponen, chief research officer at F-Secure; Dr Paul Twomey, president and chief executive officer of ICANN; Dr Vinton G. Cerf, ‘Father of the Internet’ and chief Internet evangelist at Google and Eugene Kaspersky, founder and chief executive officer of Kaspersky Lab.
Australia was well-represented with officials from the Attorney-General’s office and other government bodies attending the three-day summit.
According to IMPACT, the goal was to chart the future course for IMPACT as a global multilateral platform using ministerial roundtables, plenary sessions and information-sharing sessions about the latest cyber-security threats, trends and issues, such as, ‘Global Denial of Service’.
According to Kaspersky, IMPACT is a unique initiative, aimed primarily at consolidating efforts against cyber-terrorism.
“Like all forms of terrorism, cyber-terrorism does not recognise borders or laws, the threat of cyber-terrorism is real,” said Kaspersky.
Cyberwarfare has emerged as a genuine tool of attack against governments, critical infrastructure and corporations. Most recently, Chinese hackers were accused of attacking CNN’s website following its broadcasts of Tibetan protests earlier this year.
The Estonian government accused Russia of launching a cyber-war back in April 2007 after a number of its websites crashed. The Russian government denied any involvement.
The incident forced NATO, the North Atlantic Treaty Organization, to think about the consequences of cyber-terrorism this year, announcing its intentions to build a dedicated cyber-warfare centre in Estonia.
It has also been claimed that governments have recruited hacker armies, for example, North Korea has a legion of hackers, according to Ken Low, security marketing director at security vendor, TippingPoint.
Dmitri Alperovitch, director, intelligence analysis at Secure Computing Corporation, addressed a room of delegates at the RSA Conference in San Francisco in April and confirmed that cybercrime is financing criminal activity including terrorism and people are dying.
“There are clear cases to date of cybercriminal activity resulting in deaths of people,” he said. “This is not just bits and viruses; this is not just someone stealing a Word document; there’s a lot of talk about ties to terrorism and organised crime,”
Nationally, a new TippingPoint report, Cyber Hack Update 2008 found that cyberattacks targeted at Australian Government websites are increasing. Despite the report’s failure to determine the culprits and their motives, it does confirm the existence of a local threat.
The report found that attacks on Western Australian Government websites increased by 121 percent from 2007 to 2008. Attacks on South Australian Government websites increased by 29 percent and the Queensland Government had a 13 percent increase, year on year.
“Australia is a high profile country despite its population,” said TippingPoint’s Ken Low. “Its news attracts the attention of the world and [having] Asia as its nearest neighbour makes it certainly attractive.”
So far, the Rudd Government looks keen on participating in initiatives such as IMPACT. It recently joined forces with its international allies and private industry to test Australia’s response to a cyber-terror attack in the Cyber Storm II initiative.
It involved simulated cyber and physical attacks targeting critical infrastructure, including the water, energy, IT, communications, banking and finance industries.
“Governments that take national security seriously can’t turn a blind eye to the threat of cyber-terrorism,” Attorney-General Robert McClelland said.
The need for a multilateral organisation is here and the sheer interest and highly specialised list of delegates keen to be involved proved that point.
However, more needs to be done according to Kaspersky, who believes in the very near future, the scale of cybercriminal activities will exceed all limits. He suggests an international organisation that will act in a way similar to Interpol is necessary. “I call it the ‘Internet-Interpoll.”
The first IMPACT summit was a very promising step in the fight against cybercrime on a global scale, and was a success, according to Kaspersky.
“The decisions made will play an extremely positive role in the future fight against cybercrime,” he said.
Follow us on
Hacking is as hacking does in the US of A
Does cyber-terrorism exist?
Web 2.0 does the business
SCO does not own Unix, judge rules
Westcon-Comstor brings ‘self-healing’ storage to Australia
Dimension Data named Genesys Asia-Pacific MVP
Poll results: public cloud providers
Dell PCs vulnerable to exposing user information
Ransomware spreads to Linux servers
This article appeared in the
23rd June, 2008
issue of CRN.
Send us your tips
You must be a registered member of CRN to post a comment.
Click here to login
Click here to register
Small resellers frustrated by Office 2016 install nightmares
Microsoft prohibits installation without a Live account.
HP taps Microsoft Azure as preferred public cloud partner
Microsoft to make HPE infrastructure its preference.
EMC to cut VMware's role in Virtustream cloud venture
As VMware shares sink.
Sign up to receive CRN email bulletins
Dimension Data still on notice as NTT plans $500m cost cutting
Telstra kicks off 'root and branch' review of partner program
Review: Microsoft Surface Pro 4
Australian IT superpower born as CSC-UXC deal approved
Hands on with the HP Elite X2
Powered by Disqus
Was your most important vendor the same in 2015 as in 2014?
view previous polls »
Powered by Disqus
CRN Magazine looks in-depth at the emerging issues and developments for the channel, and provides insight, analysis and strategic information to help resellers better run their businesses.
What's in this issue?
Most popular tech stories
7 accounting packages for Australian small businesses compared: including MYOB, QuickBooks Online, Reckon, Xero
Windows 10's Cortana gets Australian makeover
14 Windows 10 problems… and how you can fix them forever
The 15 ESSENTIAL Windows 10 tips and tricks you need to know
Dick Smith gadget turns your iPhone into satellite phone
NBN considering overbuilding dodgy $800m Optus cable
Opal card behind NSW public transport revenue decline
Aussie bricklaying robot brings the fight to builders
Aurizon CIO quits
Aussie Anon sentenced to three years' prison
How to: How much RAM do you really need?
Top 25 fantasy games of all time
Backups: the 3-2-1 rule and you
14 Windows 10 problems - and how to fix them forever!
Our second Intel 750 SSD winner!
10 Xbox One exlusives that Microsoft needs to port to Windows 10
Get a Paladins closed beta code!
Star Wars original trilogy heroes and villains
Review: ASRock G10 Gaming Router
Review: Intel i7-4970K
PC & Tech Authority
nextmedia Pty Ltd
. All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's
Terms & Conditions
Login to CRN
Email or Username:
* Email or Username required
* Password required
Forgot your password?
Don't have an account? Register now!
To request a
, enter the email address linked to your CRN account and we'll send one to you.
* Email required
* Invalid Email address
* Invalid Email address
Click here to return to Login Form
comments powered by Disqus.