Space Industry and Business News  
Analysis: Terrorism 2.0

disclaimer: image is for illustration purposes only
by Leander Schaerlaeckens
Brussels (UPI) Feb 20, 2008
Terrorism and wars of the future won't be fought outdoors but from the comfort of our own homes, behind our computer screens. With cyberattacks on the rise and gaining in destructive capability, the threat to the international community is beyond current regulations and defense mechanisms, a panel of experts said last week.

"Cyber-warfare is not becoming the threat of the future, it already is," said Estonian Defense Minister Jaak Aaviksoo. Estonia endured the first publicized high-profile cyberattack during April and May 2007 when hackers crippled the country by attacking government, bank, political party, newspaper and company Web sites, following the move of a famous Soviet monument.

Hackers used a denial-of-service technique that involves using computers that have been infected with a virus to simultaneously request data from a certain Web site, causing that site to break down. They used millions of computers from as far away as the United States, Canada, Brazil and Vietnam, according to an Estonian government official.

The assault, which was originally thought to be carried out by Russia, was eventually traced back to a handful of Estonian students of Russian ethnicity, one of whom was fined $1,620 for his part in the attack last month, a sentence Aaviksoo denounced. "The fine was too much for him," he said. "I understand his emotions."

The Estonian attack raised awareness around the world of a growing problem. Last year the Pentagon drew up a report claiming that China might have a plan in place for a cyberattack that would cripple U.S. aircraft carrier battle troops. China has previously been accused of hacking into U.S. Defense Secretary Robert Gates' computer, other high-level Pentagon computers and the German government's system.

This new breed of crime could also be used to achieve political ends.

"Cyberattacks are analogues to terrorism," Aaviksoo said. "It creates instability or anxiety."

The trouble with battling cybercrime is that a skilled hacker can erase all traces and leave authorities guessing even as to where the attack was executed from. "There are no finger or footprints in cyberspace," Aaviksoo added.

And even if a country does know where it is being attacked from, there is no legislation to shut down the foreign server from which the attack is coming, which is the standard response to a cyber-threat, according to Maj. Gen. Georges D'hollander, head of NATO's C3 unit, which deals with cyberterrorism.

Cyberterrorism, which could be used to not only shut down governments and banks but also hospitals and other civilian infrastructure, can cause many millions of dollars in damages and is, according to Russian Ambassador to the EU Vladimir Chizhov, "a much greater threat than cyberattacks." Although, he added, for now, "it would be a gross exaggeration to speak of a cyberwar."

Two percent of computer owners can, whether knowingly or not, be used as soldiers in a cyberterrorism war as 1 in 50 computers is infected with malware, which is used in DOS attacks. More than 32 percent of those computers are owned by Americans, which makes them the world leader in that regard, followed by the Chinese and the Russians, according to Chizhov.

"If you want to buy a gun, you have to prove that you can keep it safe but when you buy a computer there's no such thing," Aaviksoo said.

In most countries, there is simply no legislation dealing with cybercrime, though some 80 nations are implementing it. Where there is legislation, it lacks harmony. Penalties in different countries range from a maximum of six months to 15 years in prison.

Yet sentencing is often too lenient. The $1,620 fine that was given to the Estonian hacker is unlikely to deter any terrorist seeking to cause serious harm. This creates a new form of terrorism with little to no risk to the perpetrator.

Besides Estonia's counter-cyberterrorism center, which will soon start cooperating with nine NATO member states, there is virtually no international cooperation on cyberterrorism. To its dismay, Estonia received no assistance from Russia in prosecuting its attackers.

Drafting appropriate legislation will be tricky, however, because one does not want to discourage people from using cyberspace. "It presents a paradox because the countries most developed at cyber technology are also the most vulnerable to attacks," Chizhov said.

Related Links
The Long War - Doctrine and Application



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


China defends stance on terrorism after deadly raid
Beijing (AFP) Feb 19, 2008
China said on Tuesday its stance on fighting terrorism was no different from the rest of the world, after it announced police had killed two "terrorists" in its Muslim-dominated far northwest.







  • HP And Qualcomm To Deliver Options For Worldwide Internet Access
  • Google's Android debuts in Barcelona
  • Nokia says to launch touch-screen phone in late '08
  • Lenovo pitching PCs to wider French market

  • Arianespace Mission Update: The ATV Has Been Integrated On Its Ariane 5 Launcher
  • ILS Proton Launches THOR 5 Satellite
  • Bigelow Aerospace And Lockheed Martin Converging On Terms For Launch Services
  • USAF Awards United Launch Alliance Three Delta IV Missions

  • NASA opens a rotary wing research project
  • All-star line-up at first Singapore Airshow
  • Military Aircraft To Perform Aviation Safety Research
  • Birds Bats And Insects Hold Secrets For Aerospace Engineers

  • EADS DS Delivers Army Command And Control Information System To Franco-German Brigade
  • Thompson Files: Electronic war blindness
  • Harris Provides American Forces Network With Broadcast System To Reach One Million Troops
  • Raytheon Wins Air Force Satellite Communications Contract

  • The power of healing: damaged rubber repairs itself
  • It's Raining Satellites
  • NASA MidSTAR-1 Successful Technologies May Be Revolutionary
  • Expert: AI computers by 2020

  • Michael Larkin Appointed Executive Vice President Of Orbital's Satellite Business Unit
  • Boeing Integrated Defense Systems Looks To Future With Leadership Changes
  • Raytheon Space and Airborne Systems Names Carey VP For ISR Systems
  • NASA Selects Jaiwon Shin To Head Aeronautics Research

  • NASA Extends Mission For Ball Aerospace-Built ICESat
  • CIRA Scientist Among Authors Of Book Celebrating 50 Years Of Earth Observations From Space
  • Indonesia To Develop New EO Satellite
  • Russia To Launch Space Project To Monitor The Arctic In 2010

  • Introducing The ProMark 500 Multi-Constellation GNSS RTK Receiver
  • College Student's Mobile Phones Become Lifelines To Campus Police
  • RF NEULINK Receives Contract To Support US Marine's IGRS Program
  • BrickHouse Security Reports Record Growth In Sales of GPS Tracking Devices To Police

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement