text
stringlengths
4
429
Consequences Unit, stated that because the U.S. controls so much internet
bandwidth that most of the people that want to harm the U.S. lack the
capabilities to shut down U.S. servers. (Griggs, 2008)
The U.S. faces a wide variety of challenges in protecting its own IT
structure along with facing the reality of the challenges of its allies
cyber
Baltic Security & Defence Review
Volume 11, 2009
defences. In the future the U.S. may face cyber attacks that could cause the
deaths of its or its allies
citizens due to the effects of a cyber attack on an
electrical system. The U.S.
s bilateral agreements with countries that hold a
strategic U.S. interest could be affected by the use of a cyber attack to
influence leaders. The cyber threats to the U.S. are real and continued
attention by the leaders must focus on this threat.
8. The weakest link
the computer user
As you read this article you could be an accomplice to a cyber criminal
without even knowing that your computer is conducting a worldwide
distributed denial of service attack. The actions or lack of action of
computer users have contributed to the ability of hackers in Russia and
elsewhere to conduct their attacks in relative anonymity. 7 The internet has
vulnerabilities and the individual computer user contributes to the
vulnerabilities of private and government IT systems.
In 1997 the National Security Agency (NSA) conducted an exercise to find
out how vulnerable government IT systems were to external cyber attacks.
They named the exercise
Eligible Receiver.
Thirty-five IT specialists
were given the mission to hack into government systems. They could use
any software programs that were available on the internet and they were
only given a few limitations. The IT specialists couldn
t use any classified
hacking software that belonged to the NSA and they could not violate U.S.
law. The IT specialists were also confined to U.S. government computer
systems. (Verton, 2003:32-33)
What they discovered was how easy it was to hack into government
systems, into both classified and unclassified networks. With the free
software that they downloaded from the internet, the NSA specialists were
able to conduct distributed denial of service attacks, delete or modify
sensitive information and shut down or reformat systems. Along with the
software they used, personal contact methods were also used to gain access
into the systems. The NSA computer specialists would use telephone calls
or emails to gain passwords or entry into a system by posing as a
supervisor or technician. The IT specialists were surprised at how easily
government and military members delivered their passwords without
question. Even though the exercise was conducted in 1997, and may seem
dated, it gives us a great example of how a dedicated effort can disrupt any
IT system. (Verton, 2003:32-33)
Volume 11, 2009
Baltic Security & Defence Review
As noted earlier, external flash drives were banned from use with military
computer systems. Authorized users unknowingly passed intrusive
malware files from computer to computer infecting IT systems throughout
the U.S. Central Command. The ban on flash drives complicated the
sharing of information throughout the theatre. The malware file was even
found on a classified network. This is one more example of how an
individual can spread malicious software infecting multiple computer
systems because of a lack of computer security protocols. (Melikishvili,
2008/2009)
One vulnerability that is associated with computer users is that some
people who become hackers are former employees with a grievance against
their former employer. Such people may be motivated by a personal
grudge against the U.S. government because they were fired or lost their
job due to a reorganization or downsizing. Their actions as hackers are
usually malicious in nature as such people steal or corrupt data, deface
websites, or shut down systems. (Conway, 2007:82)
Even more dangerous than an angry former employee is a case of cyber
espionage. This is where an individual who is motivated by money or
ideology sells highly sensitive IT security information. One such case
involves Herman Simm and his wife, Heete Simm, from Estonia
(Melikishvili, 2008/2009). Mr. Simm was arrested in September 2008 for
allegedly passing highly classified information on cyber security and missile
defence to members of the Russian foreign Intelligence Service (SVR). Mr.
Simm was the head of the State Secret Protection Office where he was
responsible for protecting Estonia
s classified information. Mrs. Simm was
a lawyer who was previously employed at the Estonian national police
headquarters. Mr. Simm had access to classified information concerning
NATO and allies of Estonia including the operational information of the
NATO Cooperative Cyber Defence Centre based in Tallinn. If the
Estonian government had access to a secret so did Mr. Simm. The amount
of classified information that was compromised is unknown, but may be
quite large. Mr. Simms allegedly became a Russian spy in the mid-1990
and was paid millions of dollars from the Russian Government. Regardless
of how secure a country
s IT structure is, it is still vulnerable because some
people will compromise sensitive cyber security information for personal
gain. (Melikishvili, 2008/2009)
Baltic Security & Defence Review
Volume 11, 2009
Along with the vulnerabilities already mentioned there are always problems
with software products. Some software is easy for hackers to take
advantage of because of security deficiencies. Computers may be infected
before the user or software company has identified the problem. Then it
will take time for the software company to produce a security patch. It will
take even more time to get the patch to the computer program user and
for the security patch to be installed. During this time the infected
computer program may have already infected other computers in a system