Final Report Dnagre Pwarade
Final Report Dnagre Pwarade
Final Report Dnagre Pwarade
BY
DHANASHREE NAGRE
PRIYANKA WARADE
http://www.andrew.cmu.edu/user/dnagre/
2 CYBER TERRORISM
INDEX
MOTIVATION 3
SUMMARY 4
INTRODUCTION 5
BACKGROUND 8
SCADA VULNERABILITIES 23
MEASURING CYBERCRIME 30
SURVEY RESULTS 40
REFERENCES 45
3 CYBER TERRORISM
MOTIVATION
Since 9/11, terrorism has not only caused destruction of property and life but also
crippled the government security and got into the lime-light the vulnerabilities which
each country exposes to outsiders. We have also seen an increase in the number of
terrorist activities taking place all around the world even with the great pro-active
measures taken by the government of each country.
The need of the hour is that active protection mechanisms be placed at each of our
access points such that these terrorist activities could be prevented if not stopped
completely. Even as these measures are taking place as we speak, much of the
internetwork of government organizations and other cyber resources are still
unprotected or could be compromised easily. In such an event, act of cyber terrorism as
we have defined could be used along with other things to cripple a government and
bring about as much destruction as possible.
It is necessary to educate people about such malicious acts so that cyber terrorism could
be mitigated. Our aim through this report is to do just that and help in getting
awareness amongst people about it who are not familiar with this topic. We hope that
people consider such threats seriously and thereby, help in every which way to avoid
these threats which will prove to be of adequate help to governments as well.
4 CYBER TERRORISM
SUMMARY
Internet cyber-attacks and vulnerabilities of the U.S. critical infrastructure, which are
acknowledged openly in publications, could possibly attract cyber-attacks to extort
money, or damage the U.S. economy to affect national security.
In April and May 2007, NATO and the United States sent computer security experts to
Estonia to help that nation recover from cyber-attacks directed against government
computer systems, and to analyze the methods used and determine the source of the
attacks.1 Some security experts suspect that political protestors may have rented the
services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to
help disrupt the computer systems of the Estonian government.
DOD officials have also indicated that similar cyber-attacks from individuals and
countries targeting economic, political, and military organizations may increase in the
future.
Cybercriminals have reportedly made alliances with drug traffickers in Afghanistan, the
Middle East, and elsewhere where profitable illegal activities are used to support
terrorist groups. In addition, designs for cybercrime botnets are becoming more
sophisticated, and future botnet architectures may be more resistant to computer
security countermeasures.3
This report discusses options now open to nation states, extremists, or terrorist groups
for obtaining malicious technical services from cybercriminals to meet political or
military objectives, and describes the possible effects of a coordinated cyber-attack
against the U.S. critical infrastructure. This report will be updated as events warrant.
5 CYBER TERRORISM
INTRODUCTION
“[the] use of information technology and means by terrorist groups and agents.”
-Serge Krasavin
Cybercrime is crime that is enabled by, or that targets computers. Some argue there
is no agreed-upon definition for “cybercrime” because “cyberspace” is just a new
specific instrument used to help commit crimes that are not new at all. Cybercrime
can involve theft of intellectual property, a violation of patent, trade secret, or
copyright laws. However, cybercrime also includes attacks against computers to
deliberately disrupt processing, or may include espionage to make unauthorized
copies of classified data. If a terrorist group were to launch a cyberattack to cause
harm, such an act also fits within the definition of a cybercrime. The primary
difference between a cyberattack to commit a crime or to commit terror is found in
the intent of the attacker, and it is possible for actions under both labels to overlap.
Some experts believe that there has yet been no evidence of a true cyber terrorist
attack, as defined above. Despite the horrific acts of terrorism that have occurred
over the last couple of decades, it appears that none of them fits the prevailing
definition of a politically motivated computer intrusion causing loss of life or serious
economic damage.
Computers have become an enabling tool, another type of weaponry if you will, for
what we might call information warfare or cyber crime. Regardless of our working
definition—cyber terrorism or cyber crime—the potential for creating economic
damage is great.
The U.S. military is supported partly by civilian high technology services and
products, most often in the form of communications systems and computer
software. In future conflicts that involve cyberwarfare between nations, the
distinction between U.S. military and civilian targets may be blurred and civilian
computer systems may increasingly be seen as viable targets vulnerable to attack by
adversaries.
New and sophisticated cybercrime tools could operate to allow a nation state or
terrorist group to remain unidentified while they direct cyberattacks through the
Internet. Many experts point out that past incidents of conventional terrorism have
already been linked with cybercrime, and that computer vulnerabilities may make
government and civilian critical infrastructure systems seem attractive as targets for
cyberattack.
Some experts argue that the government of Estonia may have already experienced
this type of cyberattack directed against their systems and websites in April, 2007.
terrorist groups that want to damage the U.S. economy or national security
interests. The report also examines the effects of a coordinated cyberattack against
the U.S. critical infrastructure, including use of cybercrime tools that could possibly
take advantage of openly-publicized cyber vulnerabilities. Trends in cybercrime are
described, showing how malicious Internet websites, and other cybercrimes such as
identity theft are linked to conventional terrorist activity.
8 CYBER TERRORISM
BACKGROUND
The terrorist groups are using computers and the Internet to further goals associated
with spreading terrorism. This can be seen in the way that extremists are creating and
using numerous Internet websites for recruitment and fund raising activities, and for
Jihad training purposes. Several criminals who have recently been convicted of
cybercrimes used their technical skills to acquire stolen credit card information in order
to finance other conventional terrorist activities. It is possible that as criminals and
terrorist groups explore more ways to work together, a new type of threat may emerge
where extremists gain access to the powerful network tools now used by cybercriminals
to steal personal information, or to disrupt computer systems that support services
through the Internet.
There are several effective methods for disrupting computer systems. Cyberattack or
computer network attack (CNA), is the one which uses malicious computer code to
disrupt computer processing, or steal data. Three different methods of doing so are
given below:
Botnets are becoming a major tool for cybercrime, partly because they can be
designed to very effectively disrupt targeted computer systems in different ways,
and because a malicious user, without possessing strong technical skills, can
initiate these disruptive effects in cyberspace by simply renting botnet services
from a cybercriminal. Botnets, or “Bot Networks,” are made up of vast numbers
of ompromised computers that have been infected with malicious code, and can
be remotely-controlled through commands sent via the Internet. Hundreds or
thousands of these infected computers can operate in concert to disrupt or block
Internet traffic for targeted victims, harvest information, or to distribute spam,
viruses, or other malicious code. Botnets have been described as the “Swiss
Army knives of the underground economy” because they are so versatile.
originating “botmaster.” Some studies show that authors of software for botnets
are increasingly using modern, open-source techniques for software
development, including the collaboration of multiple authors for the initial
design, new releases to fix bugs in the malicious code, and development of
software modules that make portions of the code reusable for newer versions of
malicious software designed for different purposes. This increase in
collaboration among hackers mirrors the professional code development
techniques now used to create commercial software products, and is expected
to make future botnets even more robust and reliable. This, in turn, is expected
to help increase the demand for malware services in future years.
Where illicit profits are potentially very large, some high-end criminal groups
have reportedly adopted standard IT business practices to systematically
develop more efficient and effective computer code for cybercrime. Studies also
show that organized crime groups now actively recruit college engineering
graduates and technical expert members of computer societies, and sponsor
them to attend more information technology (IT) courses to further their
technical expertise. However, in some cases, targeted students may not realize
that a criminal organization is behind the recruitment offer.
Cyberattacks are increasingly designed to silently steal information without
leaving behind any damage that would be noticed by a user. These types of
attacks attempt to escape detection in order to remain on host systems for
longer periods of time. It is also expected that as mobile communication devices
are incorporated more into everyday life, they will be increasingly targeted in the
future for attack by cybercriminals.
Malicious code, such as viruses or Trojan Horses, are used to infect a computer
to make it available for takeover and remote control. Malicious code can infect a
computer if the user opens an email attachment, or clicks an innocent-looking
12 CYBER TERRORISM
link on a website. For example, users who visited the popular MySpace and
YouTube websites in 2005, and who lacked important software security patches,
reportedly may have had their PCs infected if they clicked on a banner
advertisement which silently installed malicious code on their computers to log
keystrokes or capture sensitive data. During the first half of 2006, the Microsoft
Security Team reported that it had removed 10 million pieces of malicious
software from nearly 4 million computers and web servers. Recently, analysts at
Google tested several million web pages for the presence of malicious software,
and determined that 4.5 million of the web pages examined were suspicious in
nature. After further testing of the 4.5 million web pages, over 1 million were
found to launch downloads of malicious software, and more than two thirds of
those programs were “bot” software that, among other things, collected data on
banking transactions and then emailed the information to a temporary email
account.
Researchers at the San Jose, Calif.-based security firm, Finjan Inc., after
reviewing security data from the first quarter of 2007, found that more malware
is hosted on servers in countries such as the U.S. and U.K., than in other
countries with less developed e-crime law enforcement policies. Findings from
the Finjan 2007 Web Security Trends Report are based on an analysis of more
than 10 million unique websites from Internet traffic recorded in the UK, and
include the following:
1. Attacks that involve the use of code obfuscation through diverse
randomization techniques are growing more numerous and complex,
making them virtually invisible to pattern-matching/signature-based
methods in use by traditional antivirus products.
Finjan found that 90% of the websites examined containing malware resided on
servers located in the U.S. or U.K. “The results of this study shatter the myth that
malicious code is primarily being hosted in countries where e-crime laws are less
developed,” Finjan CTO Yuval Ben-Itzhak reportedly stated.
Identity Theft- Botnets and other examples of malicious code can operate to
assist cybercriminals with identity theft. Current FBI estimates are that identity
theft costs American businesses and consumers $50 billion a year. Individual
users are often lured into clicking on tempting links that are found in email or
when visiting websites. Clicking on titles such as “Buy Rolex watches cheap,” or
“Check out my new Photos,” can take advantage of web browser vulnerabilities
to place malicious software onto a users system which allows a cybercriminal to
gather personal information from the user’s computer.
13 CYBER TERRORISM
Malicious code can scan a victim’s computer for sensitive information, such as
name, address, place and date of birth, social security number, mother’s maiden
name, and telephone number. Full identities obtained this way are bought and
sold in online markets. False identity documents can then be created from this
information using home equipment such as a digital camera, color printer, and
laminating device, to make official-looking driver’s licences, birth certificates,
reference letters, and bank statements.
Some sources report that stolen credit card numbers and bank account
information are traded online in a highly structured arrangement, involving
buyers, sellers, intermediaries, and service industries. Services include offering to
conveniently change the billing address of a theft victim, through manipulation
of stolen PINs or passwords. Observers estimated that in 2005 such services for
each stolen MasterCard number cost between $42 and $72. Other news articles
report that, in 2007, a stolen credit card number sells online for only $1, and a
complete identity, including a U.S. bank account number, credit-card number,
date of birth, and a government-issued ID number now sells for just $14 to $18.
As of January 2007, 35 states have enacted data security laws requiring
businesses that have experienced an intrusion involving possible identity theft to
notify persons affected, and to improve security for protection of restricted data.
However, existing federal and state laws that impose obligations on information
owners, may require harmonization to provide protections that are more
uniform.
The State Department denied that the U.S. government was engaged in
industrial espionage. However, former director of the U.S. Central Intelligence
Agency, James Woolsey, has reportedly justified the possibility of industrial
espionage by the United States on the basis of the use of bribery by European
companies. Officials of the European parliament reportedly expressed outrage
about the justification, while not denying that bribery is sometimes used to
make sales.
Some government officials warn that criminals now sell or rent malicious code
tools for cyber espionage, and the risk for damage to U.S. national security due
to cyber espionage conducted by other countries is great. One industry official,
15 CYBER TERRORISM
In 2006, an extended cyberattack against the U.S. Naval War College in Newport,
Rhode Island, prompted officials to disconnect the entire campus from the
Internet. A similar attack against the Pentagon in 2007 led officials to temporarily
disconnect part of the unclassified network from the Internet. DOD officials
acknowledge that the Global Information Grid, which is the main network for the
U.S. military, experiences more than three million daily scans by unknown
potential intruders.
Accurate attribution is important when considering whether to retaliate using
military force or police action. Some DOD officials have indicated that the
majority of cyber attacks against DOD and U.S. civilian agency systems are
suspected to originate in China, and these attacks are consistently more
numerous and sophisticated than cyberattacks from other malicious actors. The
motives appear to be primarily cyber espionage against civilian agencies, DOD
contractors, and DOD systems. The espionage involves unauthorized access to
files containing sensitive industrial technology, and unauthorized research into
DOD operations. Some attacks included attempts to implant malicious code into
computer systems for future use by intruders.
Security experts warn that all U.S. federal agencies should now be aware that
in cyberspace some malicious actors consider that no boundaries exist between
military and civilian targets. According to an August 2005 computer security
report by IBM, more than 237 million overall security attacks were reported
globally during the first half of that year.54 Government agencies were targeted
the most, reporting more than 54 million attacks, while manufacturing ranked
second with 36 million attacks, financial services ranked third with approximately
34 million, and healthcare received more than 17 million attacks. The most
frequent targets for these attacks, all occurring in the first half of 2005, were
16 CYBER TERRORISM
government agencies and industries in the United States (12 million), followed
by New Zealand (1.2 million), and China (1million). These figures likely represent
an underestimation, given that most security analysts agree that the number of
incidents reported are only a small fraction of the total number of attacks that
actually occur.
17 CYBER TERRORISM
Cybercriminals have made alliances with drug traffickers in Afghanistan, the Middle
East, and elsewhere where illegal drug funds or other profitable activities such as credit
card theft, are used to support terrorist groups. Drug traffickers are reportedly among
the most widespread users of encryption for Internet messaging, and are able to hire
high-level computer specialists to help evade law enforcement, coordinate shipments of
drugs, and launder money. Regions with major narcotics markets, such as Western
Europe and North America, also possess optimal technology infrastructure and open
commercial nodes that increasingly serve the transnational trafficking needs of both
criminal and terrorist groups. Officials of the U.S. Drug Enforcement Agency (DEA),
reported in 2003 that 14 of the 36 groups found on the U.S. State Department’s list of
foreign terrorist organizations were also involved in drug trafficking. A 2002 report by
the Federal Research Division at the Library of Congress, revealed a “growing
involvement of Islamic terrorist and extremists groups in drug trafficking”, and limited
evidence of cooperation between different terrorist groups involving both drug
18 CYBER TERRORISM
trafficking and trafficking in arms. Consequently, DEA officials reportedly argued that the
war on drugs and the war against terrorism are and should be linked.
State Department officials, at a Senate hearing in March 2002, also indicated that some
terrorist groups may be using drug trafficking as a way to gain financing while
simultaneously weakening their enemies in the West through exploiting their desire for
addictive drugs. The poppy crop in Afghanistan reportedly supplies resin to produce over
90 percent of the world’s heroin, supporting a drug trade estimated at $3.1 billion.
Reports indicate that money from drug trafficking in Afghanistan is used to help fund
terrorist and insurgent groups that operate in that country. Subsequently, U.S.
intelligence reports in 2007 have stated that “al Qaeda in Afghanistan” has been
revitalized and restored to its pre-September 11, 2001 operation levels, and may now
be in a better position to strike Western countries.
Drug traffickers have the financial clout to hire computer specialists with skills for using
technologies which make Internet messages hard or impossible to decipher, and which
allow terrorist organizations to transcend borders and operate internationally with less
chance of detection. Many highly trained technical specialists that make themselves
available for hire originally come from the countries of the former Soviet Union and the
Indian subcontinent. Some of these technical specialists reportedly will not work for
criminal or terrorist organizations willingly, but may be misled or unaware of their
employers’ political objectives. Still, others will agree to provide assistance because
other well-paid legitimate employment is scarce in their region.
Some observers have stated that Al Qaeda does not see cyberattack as important for
achieving its goals, preferring attacks which inflict human casualties. Other observers
believe that the groups most likely to consider and employ cyberattack and
cyberterrorism are the terrorist groups operating in post-industrial societies (such as
Europe and the United States), rather than international terrorist groups that operate in
developing regions where there is limited access to high technology.
However, other sources report that Al Qaeda has taken steps to improve organizational
secrecy through more active and sophisticated use of technology, and evidence suggests
that Al Qaeda terrorists used the Internet extensively to plan their operations for
September 11, 2001. In past years, Al Qaeda groups reportedly used new Internet-based
telephone services to communicate with other terrorist cells overseas. Khalid Shaikh
Mohammed, one of the masterminds of the attack against the World Trade Center,
reportedly used special Internet chat software to communicate with at least two airline
hijackers. Ramzi Yousef, who was sentenced to life imprisonment for the previous
bombing of the World Trade Center, had trained as an electrical engineer, and had
planned to use sophisticated electronics to detonate bombs on 12 U.S. airliners
departing from Asia for the United States. He also used sophisticated encryption to
protect his data and to prevent law enforcement from reading his plans should he be
captured.
Tighter physical security measures now widely in place throughout the United States
may encourage terrorist groups in the future to explore cyberattack as way to lower the
risk of detection for their operations. However, other security observers believe that
terrorist organizations might be reluctant to launch a cyberattack because it would
result in less immediate drama and have a lower psychological impact than a more
conventional bombing attack. These observers believe that unless a cyberattack can be
20 CYBER TERRORISM
In July 2002, the U.S. Naval War College hosted a war game called “Digital Pearl Harbor”
to develop a scenario for a coordinated cyberterrorism event, where mock attacks by
computer security experts against critical infrastructure systems simulated state-
sponsored cyberwarfare. The simulated cyberattacks determined that the most
vulnerable infrastructure computer systems were the Internet itself, and the computer
systems that are part of the financial infrastructure. It was also determined that
attempts to cripple the U.S. telecommunications infrastructure would be unsuccessful
because built-in system redundancy would prevent damage from becoming too
widespread. The conclusion of the exercise was that a “Digital Pearl Harbor” in the
United States was only a slight possibility.
economic damage on a large scale, while other observers have stated that U.S.
infrastructure systems are resilient and would possibly recover easily, thus avoiding any
severe or catastrophic effects.
While describing possible offensive tactics for military cyber operations, DOD officials
reportedly stated that the U.S. could confuse enemies by using cyberattack to open
floodgates, control traffic lights, or scramble the banking systems in other countries.
Likewise, some of China’s military journals speculate that cyberattacks could disable
American financial markets. China, however, is almost as dependent on these U.S.
markets as the United States, and might possibly suffer even more from such a
disruption to finances. As to using cyberattack against other U.S. critical infrastructures,
the amount of potential damage that could be inflicted might be relatively trivial
compared to the costs of discovery, if engaged in by a nation state. However, this
constraint does not apply to non-state actors like Al Qaeda, thus making cyberattack a
potentially useful tool for those groups who reject the global market economy.
Organized Cybercrime - Some large cybercriminal groups are transnational, with names
like Shadowcrew, Carderplanet, and Darkprofits. Individuals in these groups reportedly
operate from locations all over the world, working together to hack into systems, steal
credit card information and sell identities, in a very highly structured, organized
network. Organized crime is also recruiting teenagers who indicate they feel safer doing
illegal activity online than in the street. A recent report from the McAfee security
organization, titled the “Virtual Criminology Report”, draws on input from Europe’s
leading high-tech crime units and the FBI, and suggests that criminal outfits are
targeting top students from leading academic institutions and helping them acquire
more of the skills needed to commit high-tech crime on a massive scale.
In the future, we may see new and different modes of criminal organization evolve in
cyberspace. Cyberspace frees individuals from many of the constraints that apply to
activities in the physical world, and current forms of criminal organization may not
transition well to online crime. Cybercrime requires less personal contact, less need for
formal organization, and no need for control over a geographical territory. Therefore,
some researchers argue that the classical hierarchical structures of organized crime
groups may be unsuitable for organized crime on the Internet. Consequently, online
criminal activity may emphasize lateral relationships and networks instead of
hierarchies.
Instead of assuming stable personnel configurations that can persist for years, online
criminal organization may incorporate the “swarming” model, in which individuals
coalesce for a limited period of time in order to conduct a specific task, or set of tasks,
and afterwards go their separate ways. The task of law enforcement could therefore
become much more difficult. If cybercriminals evolve into the “Mafia of the moment” or
the “cartel of the day,” police will lose the advantage of identifying a permanent group
22 CYBER TERRORISM
of participants who engage in a set of routine illicit activities, and this will only
contribute to the future success of organized cybercrime.
Cyber terrorist prefer using the cyber attack methods because of many advantages for
it:
SCADA Vulnerabilities
Vulnerabilities
Supervisory Control And Data Acquisition (SCADA) systems are the computers that
monitor and regulate the operations of most critical infrastructure industries (such as
the companies that manage the power grid). These SCADA computers automatically
monitor and adjust switching, manufacturing, and other process control activities, based
on digitized feedback data gathered by sensors. These control systems are often placed
in remote locations, are frequently unmanned, and are accessed only periodically by
engineers or technical staff via telecommunications links. However, for more efficiency,
these communication links are increasingly connected to corporate administrative local
area networks, or directly to the Internet.
Some experts believe that the importance of SCADA systems for controlling the
critical infrastructure may make them an attractive target for terrorists. Many SCADA
systems also now operate using Commercial-Off-The-Shelf (COTS) software, which some
observers believe are inadequately protected against a cyberattack. These SCADA
systems are thought to remain persistently vulnerable to cyberattack because many
organizations that operate them have not paid proper attention to these systems’
unique computer security needs.
The following example may serve to illustrate the possible vulnerability of control
systems and highlight cybersecurity issues that could arise for infrastructure computers
when SCADA controls are interconnected with office networks. In August 2003, the
“Slammer”Internet computer worm was able to corrupt for five hours the computer
control systems at the Davis-Besse nuclear power plant located in Ohio (fortunately, the
power plant was closed and off-line when the cyberattack occurred). The computer
worm was able to successfully penetrate systems in the Davis-Besse power plant control
room largely because the business network for its corporate offices was found to have
multiple connections to the Internet that bypassed the control room firewall.
Other observers, however, suggest that SCADA systems and the critical infrastructure
are more robust and resilient than early theorists of cyberterror have stated, and that
the infrastructure would likely recover rapidly from a cyberterrorism attack. They cite,
for example, that water system failures, power outages, air traffic disruptions, and other
scenarios resembling possible cyberterrorism often occur as routine events, and rarely
affect national security, even marginally. System failures due to storms routinely occur
at the regional level, where service may often be denied to customers for hours or days.
Technical experts who understand the systems would work to restore functions as
quickly as possible. Cyberterrorists would need to attack multiple targets simultaneously
for long periods of time to gradually create terror, achieve strategic goals, or to have
any noticeable effects on national security.
An important area that is not fully understood concerns the unpredictable interactions
between computer systems that operate the different U.S. infrastructures. The concern
24 CYBER TERRORISM
Even computers that have updated software and the newest security patches may still
be vulnerable to a type of cyberattack known as a “Zero-Day exploit.” This may occur if a
computer hacker discovers a new software vulnerability and launches a malicious attack
to infect computers before a security patch can be created by the software vendor and
distributed to protect users. Zero-day vulnerabilities in increasingly complex software
are regularly discovered by computer hackers. Recent news articles report that zero-day
vulnerabilities are now available at online auctions, where buyers and sellers negotiate
with timed bidding periods and minimum starting prices. This allows newly-discovered
computer security vulnerabilities to be sold quickly to the highest bidder. Computer
security expert Terri Forslof, of Tipping Point, has reportedly said that such practices will
“...increase the perceived value of vulnerabilities, and the good guys already have
trouble competing with the money you can get on the black market.”
The Insider Threat - A major threat for organizations is the ease with which data can
now be copied and carried outside using a variety of portable storage devices, such as
small flash drives. Newer high-density memory stick technology reportedly allows
installed computer applications to be run entirely from the flash drive. This means that
the entire contents of a PC could possibly be copied to and stored on a small, easily
portable, and easily concealed media device.
Employees with access to sensitive information systems can initiate threats in the form
of malicious code inserted into software that is being developed either locally, or under
offshore contracting arrangements. For example, in January 2003, 20 employees of
subcontractors working in the United States at the Sikorsky Aircraft Corporation were
arrested for possession of false identification used to obtain security access to facilities
containing restricted and sensitive military technology. All of the defendants pleaded
guilty and have been sentenced, except for one individual who was convicted at trial on
April 19, 2004.
Persistence of Computer System Vulnerabilities - Vulnerabilities in software and
computer system configurations provide entry points for a cyberattack. Vulnerabilities
persist largely as a result of poor security practices and procedures, inadequate training
in computer security, or technical errors in software products. Inadequate resources
devoted to staffing the security function may also contribute to poor security practices.
26 CYBER TERRORISM
Home PC users often have little or no training in best practices for effectively securing
home networks and equipment.
Because of such delays, the computer security patches installed in many organizations
may lag considerably behind the current cyberthreat situation. Whenever delays are
allowed to persist in private organizations, in government agencies, or among PC users
at home, computer vulnerabilities that are widely reported may remain unprotected,
leaving networks open to possible attack for long periods of time.
Estonia, 2007
Estonian national websites, including government ministries and the prime minister’s
Reform Party.
In the early days of the cyberattack, government websites that normally receive around
1,000 visits a day reportedly were receiving 2,000 visits every second. This caused the
repeated shut down of some websites for several hours at a time or longer, according to
Estonian officials. The attacks, which flooded computers and servers and blocked
legitimate users, were described as crippling, owing to Estonia’s high dependence on
information technology, but limited resources for managing their infrastructure.
Security experts say that the cyberattacks against Estonia were unusual because the
rate of the packet attack was very high, and the series of attacks lasted weeks, rather
than hour or days, which is more commonly seen for a denial of service attack.
Eventually, NATO and the United States sent computer security experts to Estonia to
help recover from the attacks, and to analyze the methods used and attempt to
determine the source of the attacks.
This event can serve to illustrate how computer network technology has blurred the
boundaries between crime, warfare, and terrorism. A persistent problem during and
after any cyberattack is accurate identification of the attacker, by finding out whether it
was sponsored by a nation, or was the independent work of a few unconnected
individuals, or was initiated by a group to instill frustration and fear by damaging the
computerized infrastructure and economy. The uncertainty of not knowing the initiator
also affects the decision about whom should ultimately become a target for retaliation,
and whether the response should come from law enforcement or the military.
Initially, the Russian government was blamed by Estonian officials for the cyberattacks,
and there were charges of cyberwarfare. Other observers argued that the cyberattack
involved collusion between the Russian government and transnational cybercriminals
who made their large botnets available for short-term rent, either to individuals or to
larger groups. They argue that as the rented time expired, the intensity of the persistent
cyberattacks against Estonia also began to fall off. However, not all security experts
agree, and it remains unclear at this time whether the cyberattacks were sanctioned or
initiated by the Russian government, or if a criminal botnet was actually involved.
After some investigation, network analysts later concluded that the cyberattacks
targeting Estonia were not a concerted attack, but instead were the product of
spontaneous anger from a loose federation of separate attackers. Technical data
showed that sources of the attack were worldwide rather than concentrated in a few
locations. The computer code that caused the DDOS attack was posted and shared in
many Russian language chat rooms, where the moving of the war memorial was a very
emotional topic for discussion. These analysts state that although access to various
Estonian government agencies was blocked by the malicious code, there was no
apparent attempt to target national critical infrastructure other than internet resources,
and no extortion demands were made. Their analysis thus far concluded that there was
28 CYBER TERRORISM
In January 2008, a court in Estonia convicted and fined a local man for bringing down a
government website, as part of the extended cyberattack in 2007. The 20- year-old, who
is apparently an ethnic Russian Estonian, used his home PC to carry out the attack. The
investigation continues, and so far, he is the only person convicted for participating in
the cyberattack against Estonia.
29 CYBER TERRORISM
Measuring Cybercrime
New, automated attack methods have outpaced current methods for tracking the
number and severity of cyberattacks and cybercrime intrusions. For example, according
to a study by the Cooperative Association for Internet Data Analysis (CAIDA), on January
25, 2003, the SQL Slammer worm (also known as “Sapphire”) automatically spread to
infect more than 90% of vulnerable computers worldwide within 10 minutes of its
release on the Internet, making it the fastest-spreading computer worm in history. As
the study reports, the Slammer worm doubled in size every 8.5 seconds and achieved its
full scanning rate (55 million scans per second) after about 3 minutes. It caused
considerable harm through network outages which led to numerous canceled airline
flights and automated teller machine (ATM) failures.
The use of automated tools for cybercrime has had a dramatic affect on the Computer
Emergency Response Team/ Coordinating Center (CERT/CC). In 2004, CERT/CC
announced that it had abandoned its traditional practice of producing an annual report
tracking the number of cyber intrusions recorded for each year. For many years prior to
2004, CERT/CC had maintained a database of statistics about security incidents that
were reported to it anonymously by businesses and individuals worldwide. The reason
given for abandoning its annual tracking report was because the widespread use of new,
automated cyberattack tools had escalated the number of network attacks to such a
high level, that the CERT/CC organization determined that traditional methods for
counting security incidents had become meaningless as a metric for assessing the scope
and effects f attacks against Internet-connected systems. The CERT-CC website currently
states, “Given the widespread use of automated attack tools, attacks against Internet-
connected systems have become so commonplace that counts of the number of
incidents reported provide little information with regard to assessing the scope and
impact of attacks. Therefore, beginning in 2004, we stopped publishing the number of
incidents reported.”
The FBI estimates that all types of computer crime in the U.S. now costs industry about
$400 billion, while officials in the Department of Trade and Industry in Britain say
computer crime has risen by 50 percent from 2005 to 2006. As one example of costs
associated with a recent computer security breach, TJX, the parent company of TJ Maxx,
took a $12 million charge in its fiscal first quarter of 2008 due to the theft of more than
45 million credit and debit card numbers, starting in 2006. The money reportedly went
to investigating and containing the intrusion, improving computer security,
communicating with customers, and other fees. TJX estimates that, adding damages
from future lawsuits, the breach may eventually cost $100 per lost record, or a total of
$4.5 billion.
It is estimated that only five per cent of cybercriminals are ever arrested or convicted
because the anonymity associated with web activity makes them hard to catch, and the
31 CYBER TERRORISM
trail of evidence needed to link them to a cybercrime is hard to unravel. Studies also
show that cybercrime incidents are rarely reported, especially by companies that wish
to avoid negative publicity leading to possible loss of confidence by its customers.
However, law enforcement officials argue that “maintaining a code of silence” won’t
benefit a company in the long-run. Steven Martinez, deputy assistant director for the
FBI’s cyber division, reportedly stated at the 2006 RSI Computer Security Conference
that partnerships between law enforcement, the academic community, and the private
sector are key to understanding and reducing cybercrime.
Each year, the Computer Security Institute (CSI), with help from the FBI, conducts a
survey of thousands of security practitioners from U.S. corporations, government
agencies, financial institutions, and universities. The CSI/FBI Computer Crime and
Security Survey, published annually, is perhaps the most widely-used source of
information about how often computer crime occurs and how expensive these crimes
can be. The 2006 survey indicated that the average financial loss reported due to
security breaches was $167,713, an 18% decrease from the previous year’s average loss
of $203,606.
However, some observers argue that the analyses reported in the CSI/FBI survey may be
questionable, because the survey methodology is not statistically valid. This is because
the survey is limited only to CSI members, which reduces the likelihood that
respondents are a representative sample of all security practitioners, or that their
employers are representative of employers in general. In addition, the 2006 CSI/FBI
survey points out that most companies are continuing to sweep security incidents under
the rug.
With the apparent absence of statistically valid survey results concerning the financial
costs of computer crime, and with an accompanying lack of clear data about the number
and types of computer security incidents reported, it appears that there may be no valid
way to currently understand the real scope and intensity of cybercrime. The growing use
of botnets and sophisticated malicious code also suggests that the percentage of
unreported cybercrime, plus the percentage undetected, may both be going up.
companies who distribute spyware are difficult to pursue legally because they typically
also offer some legitimate services. In many cases, the finances that back cybercrimes
are so distributed they are hard for law enforcement to figure out.
Figures from several computer security reports now used for measuring annual financial
losses to U.S. industry due to intrusions and cybercrime are believed by some observers
to be limited in scope or possibly contain statistical bias. Is there a need for a more
statistically reliable analysis of trends in computer security vulnerabilities and types of
cyberattacks to more accurately show the costs and benefits for improving national
cybersecurity? Congress may wish to encourage security experts to find more effective
ways to collect data that will enable accurate analysis of trends for cyberattacks and
cybercrime. Congress may also wish to encourage security researchers to find better
ways to identify the initiators of cyberattacks.
33 CYBER TERRORISM
The federal government has taken steps to improve its own computer security and to
encourage the private sector to also adopt stronger computer security policies and
practices to reduce infrastructure vulnerabilities. In 2002, the Federal Information
Security Management Act (FISMA) was enacted, giving the Office of Management and
Budget (OMB) responsibility for coordinating information security standards and
guidelines developed by federal agencies. In 2003, the National Strategy to Secure
Cyberspace was published by the Administration to encourage the private sector to
improve computer security for the U.S. critical infrastructure through having federal
agencies set an example for best security practices.
The National Cyber Security Division (NCSD), within the National Protection and
Programs Directorate of the Department of Homeland Security (DHS) oversees a Cyber
Security Tracking, Analysis and Response Center (CSTARC), tasked with conducting
analysis of cyberspace threats and vulnerabilities, issuing alerts and warnings for
cyberthreats, improving information sharing, responding to major cybersecurity
incidents, and aiding in national-level recovery efforts. In addition, a new Cyber Warning
and Information Network (CWIN) has begun operation in 50 locations, and serves as an
early warning system for cyberattacks. The CWIN is engineered to be reliable and
survivable, has no dependency on the Internet or the public switched network (PSN),
and reportedly will not be affected if either the Internet or PSN suffer disruptions.
In January 2004, the NCSD also created the National Cyber Alert System (NCAS), a
coordinated national cybersecurity system that distributes information to subscribers to
help identify, analyze, and prioritize emerging vulnerabilities and cyberthreats. NCAS is
managed by the United States Computer Emergency Readiness Team (US-CERT), a
partnership between NCSD and the private sector, and subscribers can sign up to
receive notices from this new service by visiting the US-CERT website.
On August 3, 2006, the U.S. Senate passed a resolution of ratification for the
Convention. The United States will comply with the Convention based on existing U.S.
federal law; and no new implementing legislation is expected to be required. Legal
analysts say that U.S. negotiators succeeded in scrapping most objectionable provisions,
thereby ensuring that the Convention tracks closely with existing U.S. laws.
DOD and Cyberattack Response - If a terrorist group were to use a cybercrime botnet to
subvert computers in a third party country, such as China, to launch a cyberattack
against the United States, the U.S. response to the cyberattack must be carefully
considered, in order to avoid retaliating against the wrong entity. Would the resulting
effects of cyberweapons used by the United States be difficult to limit or control? Would
a cyberattack response that could be attributed to the United States possibly encourage
other extremists, or rogue nations, to start launching their own cyberattacks against the
United States? Would an attempt by the U.S. to increase surveillance of another entity
via use of cyberespionage computer code be labeled as an unprovoked attack, even if
directed against the computers belonging to a terrorist group? If a terrorist group
should subsequently copy, or reverse-engineer a destructive U.S. military cyberattack
program, could it be used against other countries that are U.S. allies, or even turned
back to attack civilian computer systems in the United States? If the effects become
widespread and severe, could the U.S. use of cyberweapons exceed the customary rules
of military conflict, or violate international laws.
Commercial electronics and communications equipment are now used extensively to
support complex U.S. weapons systems, and are possibly vulnerable to cyberattack. This
situation is known to our potential adversaries. To what degree are military forces and
national security threatened by computer security vulnerabilities that exist in
commercial software systems, and how can the computer industry be encouraged to
create new COTS products that are less vulnerable to cyberattack?
35 CYBER TERRORISM
Department of Defense (DOD) officials have stated that, while the threat of cyber attack
is “less likely” to appear than conventional physical attack, it could actually prove more
damaging because it could involve disruptive technology that might generate
unpredictable consequences that give an adversary unexpected advantages. The
Homeland Security Presidential Directive 7 required that the Department of Homeland
Security (DHS) coordinate efforts to protect the cybersecurity for the nation’s critical
infrastructure. This resulted in two reports in 2005, titled “Interim National
Infrastructure Protection Plan,” and “The National Plan for Research and Development
in Support of Critical Infrastructure Protection”, where DHS provided a framework for
identifying and prioritizing, and protecting each infrastructure sector.
However, some observers question why, in light of the many such reports describing an
urgent need to reduce cybersecurity vulnerabilities, there is not an apparent perceived
sense of national urgency to close the gap between cybersecurity and the threat of
cyberattack. For example, despite Federal Information Security Management Act of
2002 (FISMA), some experts argue that security remains a low priority, or is treated
almost as an afterthought at some domestic federal agencies. In 2007, the Government
Accountability Office issued a report, titled “Critical Infrastructure Protection: Multiple
Efforts to Secure Control Systems Are Under Way, but Challenges Remain,” which states
that cybersecurity risks have actually increased for infrastructure control systems
because of the persistence of interconnections with the Internet, and continued open
availability of detailed information on the technology and configuration of the control
systems. The report states that no overall strategy yet exists to coordinate activities to
improve computer security across federal agencies and the private sector, which owns
the critical infrastructure. Some observers argue that, as businesses gradually
strengthen their security policies for headquarters and administrative systems, the
remote systems that control critical infrastructure and manufacturing may soon be seen
as easier targets of opportunity for cybercrime.
Cybercrime is obviously one of the risks of doing business in the age of the internet, but
observers argue that many decision-makers may currently view it as a low-probability
threat. Some researchers suggest that the numerous past reports describing the need to
improve cybersecurity have not been compelling enough to make the case for dramatic
and urgent action by decision-makers. Others suggest that even though relevant
information is available, future possibilities are still discounted, which reduces the
apparent need for present-day action. In addition, the costs of current inaction are not
borne by the current decision-makers. These researchers argue that IT vendors must be
willing to regard security as a product attribute that is coequal with performance and
cost; IT researchers must be willing to value cybersecurity research as much as they
value research for high performance or cost-effective computing; and, finally, IT
purchasers must be willing to incur present-day costs in order to obtain future benefits.
36 CYBER TERRORISM
Does the National Strategy to Secure Cyberspace present clear incentives for achieving
security objectives? Suggestions to increase incentives may include requiring that all
software procured for federal agencies be certified under the “Common Criteria” testing
program, which is now the requirement for the procurement of military software.
However, industry observers point out that the software certification process is lengthy
and may interfere with innovation and competitiveness in the global software market.
Should the National Strategy to Secure Cyberspace rely on voluntary action on the part
of private firms, home users, universities, and government agencies to keep their
networks secure, or is there a need for possible regulation to ensure best security
practices? Has public response to improve computer security been slow partly because
there are no regulations currently imposed? Would regulation to improve computer
security interfere with innovation and possibly harm U.S. competitiveness in technology
markets? Two of the former cybersecurity advisers to the president have differing
views: Howard Schmidt has stated that market forces, rather than the government,
should determine how product technology should evolve for better cybersecurity;
however, Richard Clarke has stated that the IT industry has done little on its own to
improve security of its own systems and products.
37 CYBER TERRORISM
The Idaho National Laboratory is tasked to study and report on technology risks
associated with infrastructure control systems. Past studies have shown that many, if
not most, automated control systems are connected to the Internet, or connected to
corporate administrative systems that are connected to the Internet, and are currently
vulnerable to a cyberattack. And, because many of these infrastructure SCADA systems
were not originally designed with security as a priority, in many cases, new security
controls cannot now be easily implemented to reduce the known security
vulnerabilities. Following past trends, where hackers and cybercriminals have taken
advantage of easy vulnerabilities, some analysts now predict that we may gradually see
new instances where cybercriminals exploit vulnerabilities in critical infrastructure
control systems.
38 CYBER TERRORISM
A 2004 survey done by the National Cyber Security Alliance and AOL showed that most
home PC users do not have adequate protection against hackers, do not have updated
antivirus software protection, and are confused about the protections they are
supposed to use and how to use them. How can computer security training be made
available to all computer users that will keep them aware of constantly changing
computer security threats, and that will encourage them to follow proper security
procedures?
Coordination Between Private Sector and Government - What can be done to improve
sharing of information between federal government, local governments, and the private
sector to improve computer security? Effective cybersecurity requires sharing of
relevant information about threats, vulnerabilities, and exploits. How can the private
sector obtain information from the government on specific threats which the
government now considers classified, but which may help the private sector protect
against cyberattack? And, how can the government obtain specific information from
private industry about the number of successful computer intrusions, when companies
resist reporting because they want to avoid publicity and guard their trade secrets?
Should cybercrime information voluntarily shared with the federal government about
successful intrusions be shielded from disclosure through Freedom of Information Act
requests?
How can the United States better coordinate security policies and international law to
gain the cooperation of other nations to better protect against a cyberattack? Pursuit of
hackers may involve a trace back through networks requiring the cooperation of many
Internet Service Providers located in several different nations. Pursuit is made
39 CYBER TERRORISM
increasingly complex if one or more of the nations involved has a legal policy or political
ideology that conflicts with that of the United States.
Thirty-eight countries, including the United States, participate in the Council of Europe’s
Convention on Cybercrime, which seeks to combat cybercrime by harmonizing national
laws, improving investigative abilities, and boosting international cooperation. However,
how effective will the Convention without participation of other countries where
cybercriminals now operate freely?
Intents behind Cyber Terrorrism:
Survey results
We created a survey to get an idea about how many people were arare of cyber
terrorism and had significant knowledge about it. We surveyed around 51 people in all
and got the following results for the different questions
5. Are you aware of any cyber attacks that were used by the Terrorists groups?
6. What according to you is the difference between Cyber Terrorism and Cyber Crime?
43 CYBER TERRORISM
7. Are you aware of the cyber attacks on the government computer systems of Estonia?
9. Have you ever encountered any terrorist activist remarks or forums on the internet?
10. Do you believe there should active education of cyber terrorism in the manner they
have for other cyber crimes to prevent innocent victims from falling for it?
45 CYBER TERRORISM
References
• Larry Greenemeier, “Estonian Attacks Raise Concern Over Cyber ‘Nuclear Winter,’”
Information Week, May 24, 2007, at
[http://www.informationweek.com/news/showArticle.jhtml?articleID=199701774]
• Tim Greene, “Storm Worm Strikes Back at Security Pros,” NetworkWorld.com, October
• For more on electromagnetic weapons, see CRS Report RL32544, High Altitude
Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat
Assessments, by Clay Wilson
• http://www.crime-research.org/articles/Cyber_Terrorism_new_kind_Terrorism/
• http://www.fas.org/sgp/crs/terror/RL32114.pdf
• David Hayes, “A Dollar goes a Long Way in Swiping Private Data,” The Kansas City
Star, March 20, 2007, p. 1
• Chris Marsden, “European Union to Investigate US-Run Satellite Spy Network,” World
Socialist Websi te, July 10, 2000, [http://www.wsws.org/articles/2000/jul2000/eche-
j10.shtml]