text
stringlengths 4
429
|
---|
Consequences Unit, stated that because the U.S. controls so much internet |
bandwidth that most of the people that want to harm the U.S. lack the |
capabilities to shut down U.S. servers. (Griggs, 2008) |
The U.S. faces a wide variety of challenges in protecting its own IT |
structure along with facing the reality of the challenges of its allies |
cyber |
Baltic Security & Defence Review |
Volume 11, 2009 |
defences. In the future the U.S. may face cyber attacks that could cause the |
deaths of its or its allies |
citizens due to the effects of a cyber attack on an |
electrical system. The U.S. |
s bilateral agreements with countries that hold a |
strategic U.S. interest could be affected by the use of a cyber attack to |
influence leaders. The cyber threats to the U.S. are real and continued |
attention by the leaders must focus on this threat. |
8. The weakest link |
the computer user |
As you read this article you could be an accomplice to a cyber criminal |
without even knowing that your computer is conducting a worldwide |
distributed denial of service attack. The actions or lack of action of |
computer users have contributed to the ability of hackers in Russia and |
elsewhere to conduct their attacks in relative anonymity. 7 The internet has |
vulnerabilities and the individual computer user contributes to the |
vulnerabilities of private and government IT systems. |
In 1997 the National Security Agency (NSA) conducted an exercise to find |
out how vulnerable government IT systems were to external cyber attacks. |
They named the exercise |
Eligible Receiver. |
Thirty-five IT specialists |
were given the mission to hack into government systems. They could use |
any software programs that were available on the internet and they were |
only given a few limitations. The IT specialists couldn |
t use any classified |
hacking software that belonged to the NSA and they could not violate U.S. |
law. The IT specialists were also confined to U.S. government computer |
systems. (Verton, 2003:32-33) |
What they discovered was how easy it was to hack into government |
systems, into both classified and unclassified networks. With the free |
software that they downloaded from the internet, the NSA specialists were |
able to conduct distributed denial of service attacks, delete or modify |
sensitive information and shut down or reformat systems. Along with the |
software they used, personal contact methods were also used to gain access |
into the systems. The NSA computer specialists would use telephone calls |
or emails to gain passwords or entry into a system by posing as a |
supervisor or technician. The IT specialists were surprised at how easily |
government and military members delivered their passwords without |
question. Even though the exercise was conducted in 1997, and may seem |
dated, it gives us a great example of how a dedicated effort can disrupt any |
IT system. (Verton, 2003:32-33) |
Volume 11, 2009 |
Baltic Security & Defence Review |
As noted earlier, external flash drives were banned from use with military |
computer systems. Authorized users unknowingly passed intrusive |
malware files from computer to computer infecting IT systems throughout |
the U.S. Central Command. The ban on flash drives complicated the |
sharing of information throughout the theatre. The malware file was even |
found on a classified network. This is one more example of how an |
individual can spread malicious software infecting multiple computer |
systems because of a lack of computer security protocols. (Melikishvili, |
2008/2009) |
One vulnerability that is associated with computer users is that some |
people who become hackers are former employees with a grievance against |
their former employer. Such people may be motivated by a personal |
grudge against the U.S. government because they were fired or lost their |
job due to a reorganization or downsizing. Their actions as hackers are |
usually malicious in nature as such people steal or corrupt data, deface |
websites, or shut down systems. (Conway, 2007:82) |
Even more dangerous than an angry former employee is a case of cyber |
espionage. This is where an individual who is motivated by money or |
ideology sells highly sensitive IT security information. One such case |
involves Herman Simm and his wife, Heete Simm, from Estonia |
(Melikishvili, 2008/2009). Mr. Simm was arrested in September 2008 for |
allegedly passing highly classified information on cyber security and missile |
defence to members of the Russian foreign Intelligence Service (SVR). Mr. |
Simm was the head of the State Secret Protection Office where he was |
responsible for protecting Estonia |
s classified information. Mrs. Simm was |
a lawyer who was previously employed at the Estonian national police |
headquarters. Mr. Simm had access to classified information concerning |
NATO and allies of Estonia including the operational information of the |
NATO Cooperative Cyber Defence Centre based in Tallinn. If the |
Estonian government had access to a secret so did Mr. Simm. The amount |
of classified information that was compromised is unknown, but may be |
quite large. Mr. Simms allegedly became a Russian spy in the mid-1990 |
and was paid millions of dollars from the Russian Government. Regardless |
of how secure a country |
s IT structure is, it is still vulnerable because some |
people will compromise sensitive cyber security information for personal |
gain. (Melikishvili, 2008/2009) |
Baltic Security & Defence Review |
Volume 11, 2009 |
Along with the vulnerabilities already mentioned there are always problems |
with software products. Some software is easy for hackers to take |
advantage of because of security deficiencies. Computers may be infected |
before the user or software company has identified the problem. Then it |
will take time for the software company to produce a security patch. It will |
take even more time to get the patch to the computer program user and |
for the security patch to be installed. During this time the infected |
computer program may have already infected other computers in a system |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.