Sales & Marketing
Training & Development
PCs & Servers
Imaging & Printing
Does cyber-terrorism exist?
Jun 24, 2008 3:40 PM
Global security experts gathered in Malaysia last month to help ramp up the world’s defenses against cyber-terrorism
Dubbed by organisers as ‘the largest ministerial-level gathering ever organised about cyber-terrorism’, the World Cyber Security Summit (WCSS), was recenlty held in Malaysia. Hosted by the International Multilateral Partnership Against Cyber-Terrorism (IMPACT), government representatives from all over the globe including Australia joined private sector and prominent security experts. The summit was chaired by Malaysian Prime Minister Dato’ Seri Abdullah Ahmad Badawi with international speakers such as Professor Howard Schmidt, former White House security advisor and former chief security officer at Microsoft and eBay.
They were joined by a multitude of security experts including Mikko Hypponen, chief research officer at F-Secure; Dr Paul Twomey, president and chief executive officer of ICANN; Dr Vinton G. Cerf, ‘Father of the Internet’ and chief Internet evangelist at Google and Eugene Kaspersky, founder and chief executive officer of Kaspersky Lab.
Australia was well-represented with officials from the Attorney-General’s office and other government bodies attending the three-day summit.
According to IMPACT, the goal was to chart the future course for IMPACT as a global multilateral platform using ministerial roundtables, plenary sessions and information-sharing sessions about the latest cyber-security threats, trends and issues, such as, ‘Global Denial of Service’.
According to Kaspersky, IMPACT is a unique initiative, aimed primarily at consolidating efforts against cyber-terrorism.
“Like all forms of terrorism, cyber-terrorism does not recognise borders or laws, the threat of cyber-terrorism is real,” said Kaspersky.
Cyberwarfare has emerged as a genuine tool of attack against governments, critical infrastructure and corporations. Most recently, Chinese hackers were accused of attacking CNN’s website following its broadcasts of Tibetan protests earlier this year.
The Estonian government accused Russia of launching a cyber-war back in April 2007 after a number of its websites crashed. The Russian government denied any involvement.
The incident forced NATO, the North Atlantic Treaty Organization, to think about the consequences of cyber-terrorism this year, announcing its intentions to build a dedicated cyber-warfare centre in Estonia.
It has also been claimed that governments have recruited hacker armies, for example, North Korea has a legion of hackers, according to Ken Low, security marketing director at security vendor, TippingPoint.
Dmitri Alperovitch, director, intelligence analysis at Secure Computing Corporation, addressed a room of delegates at the RSA Conference in San Francisco in April and confirmed that cybercrime is financing criminal activity including terrorism and people are dying.
“There are clear cases to date of cybercriminal activity resulting in deaths of people,” he said. “This is not just bits and viruses; this is not just someone stealing a Word document; there’s a lot of talk about ties to terrorism and organised crime,”
Nationally, a new TippingPoint report, Cyber Hack Update 2008 found that cyberattacks targeted at Australian Government websites are increasing. Despite the report’s failure to determine the culprits and their motives, it does confirm the existence of a local threat.
The report found that attacks on Western Australian Government websites increased by 121 percent from 2007 to 2008. Attacks on South Australian Government websites increased by 29 percent and the Queensland Government had a 13 percent increase, year on year.
“Australia is a high profile country despite its population,” said TippingPoint’s Ken Low. “Its news attracts the attention of the world and [having] Asia as its nearest neighbour makes it certainly attractive.”
So far, the Rudd Government looks keen on participating in initiatives such as IMPACT. It recently joined forces with its international allies and private industry to test Australia’s response to a cyber-terror attack in the Cyber Storm II initiative.
It involved simulated cyber and physical attacks targeting critical infrastructure, including the water, energy, IT, communications, banking and finance industries.
“Governments that take national security seriously can’t turn a blind eye to the threat of cyber-terrorism,” Attorney-General Robert McClelland said.
The need for a multilateral organisation is here and the sheer interest and highly specialised list of delegates keen to be involved proved that point.
However, more needs to be done according to Kaspersky, who believes in the very near future, the scale of cybercriminal activities will exceed all limits. He suggests an international organisation that will act in a way similar to Interpol is necessary. “I call it the ‘Internet-Interpoll.”
The first IMPACT summit was a very promising step in the fight against cybercrime on a global scale, and was a success, according to Kaspersky.
“The decisions made will play an extremely positive role in the future fight against cybercrime,” he said.
Follow us on
Hacking is as hacking does in the US of A
Does cyber-terrorism exist?
Web 2.0 does the business
SCO does not own Unix, judge rules
Microsoft has leapfrogged Google in cloud, study suggests
NextDC eyes new Melbourne, Brisbane data centres
VMware cutting back vCloud Air development
Kaspersky allegedly threatened to 'rub out' rival, email claims
Inabox to help partners acquire "struggling" rivals
This article appeared in the
23rd June, 2008
issue of CRN.
Send us your tips
You must be a registered member of CRN to post a comment.
Click here to login
Click here to register
Ads by Google
Readify wins four Microsoft Australia partner awards
UXC, Ignia and Avanade also multi-award winners.
The winners: 2015 Microsoft Australia Partner Awards
The full list of the channel's best.
Datacom wins school deal as Ruckus beats Xirrus
Wireless vendors go head-to-head.
Sign up to receive CRN email bulletins
Four iiNet directors resign, TPG boss steps in
We're not Uber! UberGlobal swamped by ridesharing requests
Is 'channel-first' just lip service?
Amcom's IT revenue crashed before Vocus buyout
Victorian IT firm whacked $72,000 for piracy
Powered by Disqus
Which distributor's cloud marketplace will be most successful?
view previous polls »
Powered by Disqus
CRN Magazine looks in-depth at the emerging issues and developments for the channel, and provides insight, analysis and strategic information to help resellers better run their businesses.
What's in this issue?
Most popular tech stories
7 accounting packages for Australian small businesses compared: including MYOB, QuickBooks Online, Reckon, Xero
Do you use Dropbox? Here are some clever tricks
How to get the best parking rates at Sydney Airport
How much does it cost to use the NBN? 14 providers compared including iiNet, Telstra, Internode
Tip: Your shop can use a smartphone instead of an EFTPOS terminal
IT staff outline deep anger in Macquarie Uni survey
When being rude to IT can get you fired
The Toshiba scandal: what went wrong?
Cheap thermal imagers can steal user PINs
IBM tries to throw Qld govt’s payroll case out of court
How to: How much RAM do you really need?
Top 25 fantasy games of all time
11 WhatsApp tricks you may not know about
How to: Make Windows admin easy with PowerShell
Top 15 obscure video game consoles for collectors
Interview: Pete Hines on Fallout 4
Fallout 4 + Fallout Shelter E3 screenshots
Fallout 4 gets MA15+ rating - and no cuts!
Preview: Star Wars Battlefront Fighter Squadron mode
Preview: Quantum Break
PC & Tech Authority
nextmedia Pty Ltd
. All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's
Terms & Conditions
Login to CRN
Email or Username:
* Email or Username required
* Password required
Forgot your password?
Don't have an account? Register now!
To request a
, enter the email address linked to your CRN account and we'll send one to you.
* Email required
* Invalid Email address
* Invalid Email address
Click here to return to Login Form
comments powered by Disqus.