This Iranian-American Dem Just Shamed Her Party About the Airstrikes and Donald Trump...
Here's the Breakdown of the First Wave of Strikes Against Iran. It's Staggering.
The Iranian Airstrikes Created a Tale of Two Liberal Media Reactions. It Was...
When a Tyrant Dies, Let the Truth Be Loud
Here's the Delusional Reason Chris Murphy Thinks President Trump Authorized Airstrikes on...
U.S. B-2 Bombers Carried Out Another Successful Strike on Iranian Ballistic Missile Sites
The USCCB Is Wrong About Birthright Citizenship
Iran and Trump's Impossibles
Iran Moves to Install New Supreme Leader After Death of Supreme Leader Khamenei
Connecticut Man Sentenced to 6 Years for Online Threats Targeting South Carolina FBI...
Possible Islamic Terror Attack at Iconic Austin Bar Leaves Two Dead and Many...
Dems Defend Dead Iranian Tyrants
U.S. Reports 3 Soldiers Killed in Action, 5 Seriously Wounded in Operation Epic...
F-35s Take Out Iranian MiGs for First Air-to-Air Kills in Operation Epic Fury
Iranian State Media Issues Threats Against Trump in Pitiful Response to the Death...
OPINION

Separating Cybersecurity Hype from Reality

The opinions expressed by columnists are their own and do not necessarily represent the views of Townhall.com.
Separating Cybersecurity Hype from Reality

LAS VEGAS -- The big players in the global information-security industry are intermingling with computer hackers this week at the annual Black Hat conference in Las Vegas. Even Chris Inglis, who stepped down as the deputy director of the National Security Agency earlier this year, is scheduled to attend the conference in his new capacity as an advisor to the American security-intelligence company Securonix. The purpose of the event is to reveal and discuss new threats and research in the field of cybersecurity.

Advertisement


So, why should you care?

Computers now affect every aspect of our lives, from transportation to banking to health care to transactions. We typically don't think much about it until there's a problem. For example, the automated commuter train we take to work every morning breaks down, or our credit card numbers are stolen from a store's database and published online, or the payment terminal at a store malfunctions and we're momentarily shocked at having to pay for a purchase in a more prehistoric way.

The phenomenon of technological ubiquity isn't even specific to the developed world anymore. Last week, Reuters quoted a Senegalese man on using his mobile phone for payments: "It is like having cash on you but safer because you don't have to carry the actual money on you all the time."

Couple this rapid technological expansion with the propensity of Middle Eastern and African banks not to disclose cyber attacks, and cyber attackers have a huge new market to exploit.

According to a new report by Palo Alto Networks, Nigerian email scammers have upped their game, moving on from soliciting bank account information from their targets to "spear phishing." This tactic uses a ruse to get the target to click on a link or open a document in an email, resulting in a code being installed on the target's computer that grants the scammer covert access to the target's computer and network.

The more we know about technology, the more we should see vulnerabilities rather than simply assume safety, as many of us do. Some of these vulnerabilities are due to the fact that government intelligence services themselves have installed backdoor access in their cryptographic protocols, which are then used by everyone in private industry. It's one thing to build in backdoor access for intelligence purposes, but this assumes that U.S. intelligence agencies are the only ones in the world smart enough to find and use the back door.

The flip side of technological complacency is that average users are prone to getting spooked by either an attack or the mass publicity around one. They tend to overreact and start seeing cyber-bogeymen everywhere. It's easy for paranoia to flood in and fill a knowledge vacuum.

In much the same way that the military-industrial complex thrives on the fear of war, the IT-industrial complex benefits from public paranoia. Few information-security professionals publicly shrug off some of the obvious smoke and mirrors, such as the recent denial-of-service attacks on some Israeli government websites by the hacktivist group Anonymous -- including the public-facing website of Israel's foreign intelligence service, Mossad -- at a time when the conflict in Gaza has reignited. If Anonymous wanted to pose a legitimate threat, it would be hacking Israel's Iron Dome missile-defense system rather than blocking the e-driveway to a few websites.

A much-hyped Black Hat presentation this week by a cybersecurity researcher will reportedly reveal how vulnerabilities in an airplane's wireless Internet or entertainment system can compromise its aviation equipment. But both the equipment manufacturer and the researcher himself have questioned the practical feasibility of the risk.

There's a fine but critical line in all of this, with the information-security industry getting together to assess threats and risk, and the subsequent possibility of the general public being spooked by potential threats that it can't fully understand because of technical complexities.

To ascertain the true degree of risk and paint a clear picture of what a "Cyber 9/11" attack would look like, it would be valuable for an event like Black Hat to host an expert-designed, "force-on-force" war game, with top cybersecurity experts facing off against the world's best hackers. Let's find out how much hysteria is warranted for a worst-case cyber-Armageddon.

The information-security industry should also partner with political-risk specialists to gain a broader understanding of who the attackers are, what they are after based on system resources they have previously targeted, and where the government and the private sector should be focusing their cybersecurity resources.

Where there's political unrest, there's cybersecurity risk. It's a logical extension of geopolitical competition. And it's critical to keep it all in perspective.

Advertisement

Join the conversation as a VIP Member

Recommended

Trending on Townhall Videos

Advertisement
Advertisement
Advertisement