News / USA

    Could IS Turn Next to Cyber War?

    FILE - Hackers who say they are loyal to the Islamic State group, take over the U.S. Central Command Twitter account, Jan. 12, 2015.
    FILE - Hackers who say they are loyal to the Islamic State group, take over the U.S. Central Command Twitter account, Jan. 12, 2015.

    The power is out. Gas stations are out of gas. Factories are going haywire.

    It sounds like an action movie, but some analysts tell VOA that U.S. industries need to significantly ramp up their cyber security or risk having the Islamic State (IS) hack, attack and create mayhem inside their systems.

    "This is definitely a threat to the U.S. government and other western governments, but also to our industrial control systems — the ones that run our manufacturing plants, moving energy across the country, that have vulnerabilities," said Bob Gourley, the former chief technology officer of the Defense Intelligence Agency.

    Unlike cyberattacks by Russia and China, Gourley said, groups like IS are less interested in just extracting information and more interested in disrupting essential systems.

    "They are going to want to cause mischief and grab attention, so destroying equipment or changing information that makes us question our own systems," said Gourley, co-founder of Cognitio and publisher of ThreatBrief.com.

    FILE - A computer screen is pictured at TV5 Monde after the French television network was hacked by people claiming allegiance to the Islamic State group, in Paris, France, April 9, 2015.
    FILE - A computer screen is pictured at TV5 Monde after the French television network was hacked by people claiming allegiance to the Islamic State group, in Paris, France, April 9, 2015.

    As yet, he added, IS militants are not as capable as some criminal networks or rival nations, "but IS has more capabilities that any other terrorist organization that I know of. And they can gain more."

    Protecting government systems

    So far, IS has established itself as a leader in using Internet-based communications and social media to both send encrypted information and recruit thousands of people from more than 80 countries around the world.

    "We are in a new age of this threat," Gourley said, "and the most important thing is we need to defend our systems better than they are currently being defended."

    Clifton Triplett, recently named the Office of Personnel Management's senior cyber and information technology adviser, said he is already working to limit any kind of IS breach into the government department.

    "I think what I have to do is … assume that, at some point in time, they may be successful," Triplett said at a conference organized by Bloomberg Government. "So how do I minimize the impact of their success? Right now, that really comes into access control."

    OPM suffered a major hack earlier in 2015, resulting in the disclosure of private information of some 21.5 million people, including those who applied for security clearances.

    Anticipating IS

    But Al Berman, president and CEO of Disaster Recovery Institute International, which covers IT disasters, said it would be dangerous to assume that IS would stop at communication and marketing.

    FILE - This screen grab from an Islamic State group-affiliated Twitter account, taken Sept. 20, 2014, purports to show a military commander handing a flower to a child while visiting southern Iraq. The group is a leader in using Internet-based communications.
    FILE - This screen grab from an Islamic State group-affiliated Twitter account, taken Sept. 20, 2014, purports to show a military commander handing a flower to a child while visiting southern Iraq. The group is a leader in using Internet-based communications.

    "This is not an unsophisticated organization. And if we look at it that way, we are vastly underestimating their capabilities," Berman told VOA.

    One path of attack that IS could take, Berman said, would be to siphon money from institutions — perhaps in the U.S., perhaps in the Middle East — in order to increase their funding as the extremist group's oil and tax money streams start drying up.

    "Money is incredibly important, and they will find other means if we shut down their traditional means," Berman said.

    And IS does not have to do the hacking itself, it just needs to buy the information from hacking-obtained information auctions on the dark web.

    Berman said IS could start to further refine their "social engineering" or "emotional marketing" techniques, basically by using the Internet in more sophisticated ways to track down and entice potential young recruits.

    Vulnerable universities

    For that, IS could hack into universities or buy information on the dark web from universities that have already been hacked.

    According to Privacy Rights Clearinghouse, a California-based nonprofit that focuses on privacy protection, in the last five years hackers have accessed more than 2.5 million records from colleges and universities in the United States alone.

    John Matherly, founder of Shodan, a search engine for Internet-connected devices, said exploiting student information would be far more likely than an IS attack on a facility such as a water treatment plant.

    "Universities and educational institutions tend to have the worst security by far because they have these giant IP ranges. So students use a public IP address that anyone can see, and everything is exposed," Matherly said.

    'Low-hanging fruit' for hackers

    Conversely, complex Internet-connected control systems — such as those in water treatment plants, office buildings, factories, traffic lights, and solar power farms — are not always difficult to access, but they are difficult to compromise.

    "There are devices that have no authentication. You don't need to provide a user name or a password. You can just access it; you can connect to it and talk. But there is a difference between connecting to a device and knowing what to do with it when you do," Matherly told VOA.

    "It is important to separate the ability to access a control system from the ability to damage that system," he said. "The more likely scenario is that someone logs in and runs different commands and by accident causes it to fail."

    But hackers such as IS do not have to be sophisticated to be damaging, Matherly said. Unpatched webservers, unprotected utility software accounts, individuals not keeping up with security updates, and even Instagram accounts could be easily attacked.

    "Control systems are expensive and a long-term effort," Matherly said. "I am sure they are already looking into it, but if you are only looking for attention, it is much more effective to go after low-hanging fruit, and there is plenty out there."


    Sharon Behn

    Sharon Behn is a foreign correspondent working out of Voice of America’s headquarters in Washington D.C  Her current beat focuses on political, security and humanitarian developments in Iraq, Syria and Turkey. Follow Sharon on Twitter and on Facebook.

    You May Like

    Hope Remains for Rio Olympic Games

    Facing a host of problems, Rio prepares for holding the games but experts say some risks, like Zika, may not be as grave as initially thought

    IS Use of Social Media to Recruit, Radicalize Still a Top Threat to US

    Despite military gains against IS in Iraq and Syria, their internet propaganda still commands an audience; US officials see 'the most complex challenge that the federal government and industry face'

    ‘Time Is Now’ to Save Africa’s Animals From Poachers, Activist Says

    During Zimbabwe visit, African Wildlife Foundation President Kaddu Sebunya says poaching hurts Africa as slave trade once did

    This forum has been closed.
    Comments
         
    There are no comments in this forum. Be first and add one

    Featured Videos

    Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
    Ivorian Chocolate Makers Promote Locally-made Chocolatei
    X
    July 29, 2016 4:02 PM
    Ivory Coast is the world's top producer of cocoa but hardly any of it is processed into chocolate there. Instead, the cocoa is sent abroad to chocolate makers in Europe and elsewhere. This is a general problem throughout Africa – massive exports of raw materials but few finished goods. As Emilie Iob reports from Abidjan, several Ivorian entrepreneurs are working to change that formula - 100 percent Ivorian chocolate bar at a time.
    Video

    Video Ivorian Chocolate Makers Promote Locally-made Chocolate

    Ivory Coast is the world's top producer of cocoa but hardly any of it is processed into chocolate there. Instead, the cocoa is sent abroad to chocolate makers in Europe and elsewhere. This is a general problem throughout Africa – massive exports of raw materials but few finished goods. As Emilie Iob reports from Abidjan, several Ivorian entrepreneurs are working to change that formula - 100 percent Ivorian chocolate bar at a time.
    Video

    Video Tesla Opens Battery-Producing Gigafactory

    Two years after starting to produce electric cars, U.S. car maker Tesla Motors has opened the first part of its huge battery manufacturing plant, which will eventually cover more than a square kilometer. Situated close to Reno, Nevada, the so-called Gigafactory will eventually produce more lithium-ion batteries than were made worldwide in 2013. VOA's George Putic reports.
    Video

    Video Polio-affected Afghan Student Fulfilling Her Dreams in America

    Afghanistan is one of only two countries in the world where children still get infected by polio. The other is Pakistan. Mahbooba Akhtarzada who is from Afghanistan, was disabled by polio, but has managed to overcome the obstacles caused by this crippling disease. VOA's Zheela Nasari caught up with Akhtarzada and brings us this report narrated by Bronwyn Benito.
    Video

    Video Hillary Clinton Promises to Build a 'Better Tomorrow'

    Democratic presidential candidate Hillary Clinton urged voters Thursday not to give in to the politics of fear. She vowed to unite the country and move it forward if elected in November. Clinton formally accepted the Democratic Party's nomination at its national convention in Philadelphia. VOA national correspondent Jim Malone has more.
    Video

    Video Trump Tones Down Praise for Russia

    Republican presidential candidate Donald Trump is toning down his compliments for Russia and Vladimir Putin as such rhetoric got him in trouble recently. After calling on Russia to find 30.000 missing emails from rival Hillary Clinton, Trump told reporters he doesn't know Putin and never called him a great leader, just one who's better than President Barack Obama. Putin has welcomed Trump's overtures, but, as Zlatica Hoke reports, ordinary Russians say they are not putting much faith in Trump.
    Video

    Video Uganda Unveils its First Solar-powered Bus

    A solar-powered bus described by its Ugandan makers as the first in Africa has made its public debut. Kiira Motors' electric bus, Kayoola, displayed recently at a stadium in Uganda's capital. From Kampala, Maurice Magorane filed this report narrated by Salem Solomon.
    Video

    Video Silicon Valley: More Than A Place, It's a Culture

    Silicon Valley is a technology powerhouse and a place that companies such as Google, Facebook and Apple call home. It is a region in northern California that stretches from San Francisco to San Jose. But, more than that, it's known for its startup culture. VOA's Elizabeth Lee went inside one company to find out what it's like to work in a startup.
    Video

    Video Immigrant Delegate Marvels at Democratic Process

    It’s been a bitter and divisive election season – but first time Indian-American delegate Dr. Shashi Gupta headed to the Democratic National Convention with a sense of hope. VOA’s Katherine Gypson followed this immigrant with the love of U.S. politics all the way to Philadelphia.
    Video

    Video Dutch Entrepreneurs Turn Rainwater Into Beer

    June has been recorded as one of the wettest months in more than a century in many parts of Europe. To a group of entrepreneurs in Amsterdam the rain came as a blessing, as they used the extra water to brew beer. Serginho Roosblad has more to the story.
    Video

    Video Commerce Thrives on US-Mexico Border

    At the Democratic Convention in Philadelphia this week, the party’s presumptive presidential nominee, Hillary Clinton, is expected to attack proposals made by her opponent, Republican presidential nominee Donald Trump, to build a wall along the U.S.-Mexico border. Last Friday, President Barack Obama hosted his Mexican counterpart, President Enrique Peña Nieto, to underscore the good relations between the two countries. VOA’s Greg Flakus reports from Tucson.
    Video

    Video Film Helps Save Ethiopian Children Thought to be Cursed

    'Omo Child' looks at effort of African man to stop killings of ‘mingi’ children
    Video

    Video London’s Financial Crown at Risk as Rivals Eye Brexit Opportunities

    By most measures, London rivals New York as the only true global financial center. But Britain’s vote to leave the European Union – so-called ‘Brexit’ – means the city could lose its right to sell services tariff-free across the bloc, risking its position as Europe’s financial headquarters. Already some banks have said they may shift operations to the mainland. Henry Ridgwell reports from London.

    Special Report

    Adrift The Invisible African Diaspora