News / USA

Google Attacks Highlight Growing Problem of Cyber Security Threats

Staff members attend an event where Homeland Security Secretary Janet Napolitano delivered remarks at the opening ceremony of the new U.S. Computer Emergency Readiness Team/National Cybersecurity and Communications Integration Center (File)
Staff members attend an event where Homeland Security Secretary Janet Napolitano delivered remarks at the opening ceremony of the new U.S. Computer Emergency Readiness Team/National Cybersecurity and Communications Integration Center (File)

Google’s recent disclosure that it was the target of a highly sophisticated cyber attack has brought renewed attention to the growing problem of cyber security threats. Officials and security experts say that while past cyber attacks focused largely on national secrets and defense technologies, that focus is changing.

Speaking at a recent congressional hearing on future threats to U.S. national security, FBI Director Robert Mueller said cyber attacks are increasingly taking a wider aim. [Director Mueller’s Testimony to Senate Committee on Intelligence] "As the global economy integrates, many cyber threats now focus on economic or non-government targets as we have seen with the recent cyber attack on Google," he explained. "Targets in the private sector are at least as vulnerable and the damage can be just as great."

 

Main points in Director Mueller’s testimony

• Cyber threats stem from both state actors, including foreign governments that use their vast resources to develop cyber technologies with which to attack our networks, and non-state actors such as terrorist groups and hackers that act independently of foreign governments
• State actors continue to be a threat to both our national security as well as our economic security because they have the technical and financial resources to support advanced network exploitation and attack
• The greatest cyber threat is posed by countries that continue to openly conduct computer network attacks and exploitations on American systems
• Terrorists show a growing understanding of the critical role that information technology plays in the day-to-day operations of our economy and national security.
• Their recruitment efforts have expanded to include young people studying mathematics, computer science and engineering in an effort to move from the limited physical attacks to attacks against our technical systems
• Fortunately, the large majority of hackers do not have the resources or motivation to attack the US critical information infrastructures
• It is increasingly the case that counterterrorism, counterintelligence, cyber, and criminal investigations are interrelated

Online enterprises face enormous threats

Internet Security Alliance President Larry Clinton says online enterprises face enormous threats because in the world of cyber security all of the incentives favor the attackers.  "Cyber attacks are currently comparatively cheap, they are comparatively easy to launch; the amount you can steal is enormous.  The chances of getting caught are fairly small," says Clinton.

He adds that, with attackers enjoying a virtually limitless range of targets, and defense a generation behind the attacker, the annual economic losses from cyber threats are great.

"The situation is extremely serious.  Last year, American business probably lost a trillion dollars in intellectual property theft, there were billions more that were lost due to down time, inefficiency, et cetera."

 

Audio extras
Larry Clinton: Logic bombs in the supply chain (1:30)
Larry Clinton: Cyber security is not like Y2K (1:14)
Randy Vickers: Could the U.S. face a digital Pearl Harbor? (1:03)

 

Countering threats and challenges

Randy Vickers, acting director of the U.S. Homeland Security Department's Computer Emergency Readiness Team, says one of the biggest challenges with cyber attacks is that there is never a single muzzle flash that tells you where the attack originated.

"With a cyber event, because there are multiple hot points, multiple places where it could be coming from,” Vickers stated. “You cannot say that IP [Internet protocol] address or that workstation or that host or that Web site or that technological capability is the first place it originated from."

Vickers says intent is a key fingerprint used to track down attackers.  "We are trying to understand those types of fingerprints so we can tie back to attribution," he said. "But it is long and arduous, and it comes back to: what is the intent?  Is it a hack-tivist, is it a nation state, is it a terrorist, is it just a person out to prove that they can do something like the old days used to be?"

President Barack Obama has made cyber security a top priority for his administration, and has listed the threat from cyber weapons along with other weapons of mass destruction - such as nuclear, chemical and biological weapons.

Last year, he appointed Howard Schmidt as the country’s cyber czar [see White House’s recently released  National Cyber Security Initiative] to watch over the nation's networks, from systems that direct planes to those that help Americans pay their bills online.

President Obama says cyber security is one of the “most serious economic and national security challenges we face as a nation.”

ISA's Clinton says that such attention is helping, but he notes that the key to building more security is to give businesses more incentives to protect themselves from attacks.

"There is a public benefit that would come to everybody if we could substantially increase our cyber security, because even if I do everything to secure my system, if it interacts with your system and you are not secure, the attackers will get into your system, and through you, get to me," Clinton explained.

Clinton says one way to boost cyber security is by encouraging smaller companies to do more to protect themselves from attacks by using tax incentives, government contracts, and small business administration assistance.

Because, as he and other experts note, “We are only as strong as our weakest link.”

 

You May Like

Multimedia Obama, Modi Announce Breakthrough on Nuclear Deal

Deal resolves differences over liability of suppliers to India in event of a nuclear accident, U.S. demands on tracking whereabouts of material supplied to country More

WHO's Late Efforts in Tackling Ebola Highlight Need for Reform

Health experts debate measures to reform agency’s response to global public health emergencies in special one-day session on deadly outbreak More

One Tumultuous Year in Power for CAR's President

As sectarian violence raged across Central African Republic, interim President Catherine Samba-Panza has Herculean task: to end civil war and put country back on right track More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Worldwide Photo Workshops Empower Youthi
X
Julie Taboh
January 23, 2015 11:08 PM
Last September, 20 young adults from South Sudan took part in a National Geographic Photo Camp. They are among hundreds of students from around the world who have learned how to use a camera to tell the stories of the people in their communities through the powerful medium of photography. Three camp participants talked about their experiences recently on a visit to Washington. VOA’s Julie Taboh reports.
Video

Video Worldwide Photo Workshops Empower Youth

Last September, 20 young adults from South Sudan took part in a National Geographic Photo Camp. They are among hundreds of students from around the world who have learned how to use a camera to tell the stories of the people in their communities through the powerful medium of photography. Three camp participants talked about their experiences recently on a visit to Washington. VOA’s Julie Taboh reports.
Video

Video US, Japan Offer Lessons as Eurozone Launches Huge Stimulus

The Euro currency has fallen sharply after the European Central Bank announced a bigger-than-expected $67 billion-a-month quantitative easing program Thursday - commonly seen as a form of printing new money. Henry Ridgwell reports for VOA from London on whether the move might rescue the eurozone economy -- and what lessons have been learned from similar programs around the world.
Video

Video Nigerian Elections Pose Concern of Potential Conflict in 'Middle Belt'

Nigeria’s north-central state of Kaduna has long been the site of fighting between Muslims and Christians as well as between people of different ethnic groups. As the February elections approach, community and religious leaders are making plans they hope will keep the streets calm after results are announced. Chris Stein reports from the state capital, Kaduna.
Video

Video As Viewership Drops, Obama Puts His Message on YouTube

Ratings reports show President Obama’s State of the Union address this week drew the lowest number of viewers for this annual speech in 15 years. White House officials anticipated this, and the president has decided to take a non-traditional approach to getting his message out. VOA White House correspondent Luis Ramirez reports.
Video

Video S. Korean Businesses Want to End Trade Restrictions With North

Business leaders in South Korea are calling for President Park Geun-hye to ease trade restrictions with North Korea that were put in place in 2010 after the sinking of a South Korean warship.Pro-business groups argue that expanding trade and investment is not only good for business, it is also good for long-term regional peace and security. VOA’s Brian Padden reports.
Video

Video US Marching Bands Grow Into a Show of Their Own

The 2014 Super Bowl halftime show was the most-watched in history - attracting an estimated 115 million viewers. That event featured pop star Bruno Mars. But the halftime show tradition started with marching bands, which still dominate the entertainment at U.S. high school and college American football games. But as Enming Liu reports in this story narrated by Adrianna Zhang, marching bands have grown into a show of their own.
Video

Video Secular, Religious Kurds Face Off in Southeast Turkey

Turkey’s predominantly Kurdish southeast has been rocked by violence between religious and secular Kurds. Dorian Jones reports on the reasons behind the stand-off from the region's main city of Diyarbakir, which suffered the bloodiest fighting.
Video

Video Kenya: Misuse of Antibiotics Leading to Resistance by Immune System

In Kenya, the rise of drug resistant bacteria could reverse the gains made by medical science over diseases that were once treatable. Kenyans could be at risk of fatalities as a result if the power in antibiotics is not preserved. Lenny Ruvaga has more on the story from Nairobi.
Video

Video Solar-Powered Plane Getting Ready to Circumnavigate Globe

Pilots of the solar plane that already set records flying without a drop of fuel are close to making their first attempt to fly the craft around the globe. They plan to do it in 25 flying days over a five month period. VOA’s George Putic reports.
Video

Video How Experts Decide Ethiopia Has the Best Coffee

Ethiopia’s coffee has been ranked as the best in the world by an international group of coffee connoisseurs. Not surprisingly, coffee is a top export for the country. But at home it is a source of pride. Marthe van der Wolf in Addis Ababa decided to find out what makes the bean and brew so special and how experts make their determinations.
Video

Video Yazidi Refugees at Center of Political Fight Between Turkey, Kurds

The treatment of thousands of Yazidis refugees who fled to Turkey to escape attacks by Islamic State militants has become the center of a dispute between the Turkish government and the country's pro-Kurdish movement. VOA's Dorian Jones reports.
Video

Video World’s Richest 1% Forecast to Own More Than Half of Global Wealth

The combined wealth of the world's richest 1 percent will overtake that of the remaining 99 percent at some point in 2016, according to the anti-poverty charity Oxfam. Campaigners are demanding that policymakers take action to address the widening gap between the ‘haves’ and the ‘have nots’, as Henry Ridgwell reports for VOA from London.

Circumventing Censorship

An Internet Primer for Healthy Web Habits

As surveillance and censoring technologies advance, so, too, do new tools for your computer or mobile device that help protect your privacy and break through Internet censorship.
More

All About America

AppleAndroid