->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

An e-Jihad Against eGovernment?

by Giles Trendle ,© KAM Ltd 2002, All rights reserved

Monday, 9th September 2002 - The move towards military action against Iraq is raising the possibility of an increase in electronic attacks by activists or hacking groups sympathetic to Iraq or opposed to any military attack.

One such hacker, interviewed by e-mail for this article, warned that Western governments and businesses should brace themselves for 'suicide cyber attacks' in the event of a war against Iraq. He defined a 'suicide cyber attack' as one in which the hacker sets out to cause maximum damage unhindered by any regard for being detected and caught. The hacker who issued this stark warning belongs to a group calling itself the Iron Guards which has in the past attacked Israeli government and business websites as part of the Arab-Israeli cyberwar.

Such talk may be no more than rhetorical swagger. Yet some indicators already point to an escalation of digital attacks. mi2g, a London-based company specialising in Internet security, has recorded August 2002 as the worst month for overt digital attacks ever since its records began in 1995. "It would seem highly likely that the launch of a physical attack on Iraq will see counter-attacks from disgruntled Arab, Islamic fundamentalist and anti-American groups," concludes DK Matai, Chairman and CEO of mi2g.

Hacking comes under what military theorists refer to as 'asymmetric warfare', in which unconventional tactics are used by smaller players to counter the overwhelming conventional military superiority of an adversary. Like a classic guerrilla struggle, such digital warfare is a conflict of the weak against the strong, in which the weaker force probes and attacks the vulnerable points in its enemy's defences.

The Achilles Heel of modern technology appears to be that no computer system is totally invulnerable to being 'cracked'. This has raised fears that hacking might enable an individual or small group to wreak havoc in terms of defacing or 'downing' government websites, spreading viruses and worms that infect and disrupt computer systems, or even using the Internet as a direct instrument of death by taking remote control of systems operating dam floodgates or air traffic control.

The IT proficiency of militant Islamic hackers was recently raised by American officials who admitted they have underestimated the amount of attention al-Qaeda was paying to the internet. "Al-Qaeda spent more time mapping our vulnerabilities in cyberspace than we previously thought," said Roger Cressey, the chief of staff of the White House critical infrastructure protection board, in a recent interview with the Washington Post. "The question is a question of when, not if."

The National Infrastructure Security Co-ordination Centre (NISCC), an interdepartmental organisation created by the Home Secretary in 1999 with the task of protecting the UK's infrastructure from electronic attack, says it is keeping this threat under constant review.

In a statement for this article, the NISCC said: "Although the UK is increasingly vulnerable to electronic attacks, like other technologically advanced societies, there is nothing to suggest that the UK's critical national infrastructure, including government, is at risk of widespread and disruptive electronic attack should the UK participate in any possible military campaign against Iraq."

The NISCC added, however, that in the event of a war on Iraq, what it called 'Islamic extremists' - or any other hacking groups - "may be motivated to carry out less sophisticated attacks such as website defacements or denial of service attacks." In other words, there may be more digital attacks, but nothing to get overly-worried about at this point in time.

The e-Envoy's office also says it is active vis-à-vis any cyber threat. "The government has developed a set of Security Frameworks to provide a common approach to security for eGovernment services, which the Office of the e-Envoy is publishing," said a source from the e-Envoy's office. "We believe that we are building adequate security measures into our services, but no-one can afford to be complacent."

Some experts in the private sector feel that hysteria is as bad as complacency. "I think the media overplays the hype associated with cyberterrorism," says Clifford May, chief forensic consultant at Integralis, an IT security company in the UK. "Large organisations may be an attractive target, but they have very strong security in place."

The website Vmyths.com (www.vmyths.com) has a self-declared goal of the "eradication of computer virus hysteria." With acerbic wit, the industry writers at Vmyths seek to expose what they feel lies behind the hullabaloo about computer security: namely, media ignorance, scare-mongering consultants and profit-seeking antivirus companies.

So will war on Iraq lead to an e-jihad against eGovernment? There may possibly be more digital attacks, but the levels of skill and efficacy of such attacks remains unclear. Hackers - like the Al-Qaeda network - can be dispersed, nebulous and elusive. Such a threat, because it is unseen, creates uncertainty and where there is uncertainty there is room for fear (and fear-mongering).

The response to cyber-threats from American and British officials may appear different. American officials seem more ready to conceive (even predict) the possibility of a devastating and catastrophic attack by cyberterrorists. The White House advisor for cyberspace security recently referred to the possibility of a 'digital Pearl Harbour'. British cyber-officials, on the other hand, maintain a more reserved tone. Hopefully, the difference between us and the Americans is one of cultural expression, and not in any way one of professional diligence.

Giles Trendle is a former Middle East war correspondent who today writes and speaks on advocacy networks and anti-corporate activism. His website is http://www.globalprofile.co.uk/

Giles Trendle's independent opinion appears courtesy of Prospect - a recruitment consultancy committed to 'enabling better features' and sourcing the people to drive eGovernment. For further information go to http://www.prospectmsl.com/ or email info@prospectmsl.com


Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy