War in Cyberspace
PITCOM Journal
DK Matai, Chairman & CEO of mi2g, outlined some of the major elements
of Cyber-warfare in a talk on 22 October to the Real Time Club. The following
are some extracts from his speech.
Monday, 3rd December 2001 Cyberspace encompasses
digital systems, communication channels and media including television, radio,
eMail, telephone and connected computer and mobile devices. Cyberspace has
unified people regardless of where they are. In Cyberspace people sharing
a common faith can meet, exchange ideas and plan ways regardless of whether
they are, for example, in Jakarta, Islamabad, Teheran, Baghdad, Beirut, Cairo
or Casablanca.
Cyberwarfare’s first pivot is as a community fragmenter / propaganda machine
In the battle for hearts and minds, the Al-Jazeera satellite channel is able
to reach Muslims anywhere in the world that have access to satellite broadcast.
Cyberwarfare’s second pivot is attack and counter-attack on digital systems.
The damage that an asymmetric electronic attack can do to our industrialised
society is greater than what could be inflicted on a developing or under-developed
country.
Recent attacks
Hackers in many Islamic countries including Pakistan declared a cyber jihad
on the US and Britain last week, only days after the FBI issued a warning
predicting as much. Also last week, Pakistani hacker group G-Force defaced
the site of the National Oceanic and Atmospheric Administration (NOAA) Center,
part of the US Department of Commerce, leaving a message promising more of
the same type of attacks.
The day before yesterday, G-Force Pakistan defaced a site operated by the
US Department of Defense (DoD) with a message about terrorism and Islam, The
message on the DoD site – Defense Test & Evaluation Processional Institute
(DTEPI) – posted by G-Force "We will not rest till every node, every line,
every bit of information contained in our suppressors has been wiped out,
returning them to the dark ages."
Defence expertise
The focus of UK and US defence has been on the physical dimensions – land,
sea, air and outer space – and not on cyberspace.
Cyber warfare poses threats directly to lower level infrastructure in all
government departments and commercial institutions. The expertise needed against
such threats requires expertise that is relatively fast moving and cannot
be ‘trained’ into people over a short period of time.
(Fragmented intelligence)
The single biggest failing of Western Intelligence Agencies in not having
picked up the 11th September attacks is their fragmented electronic intelligence
gathering systems, which have no capability to unify knowledge management
and analysis.
It is an Herculean task to collect, sift, analyse and act on this intelligence
data if the key pieces of knowledge are not to be missed. This cannot be done
manually and we need really smart technology solutions to help us.
If the threat and targets are international, the Allied countries’ knowledge
management and analysis systems handling intelligence data need to be able
to talk to each other. This has not been true for Agencies even within the
same country, especially the US, who up until now jealously guard information
that they collect themselves.
Protection and civil liberties – loss of privacy
In order to reassure its citizens, the government needs to act and be seen
to reassure its people and be seen to deploy a series of counter measures.
Individual freedom and protection through security always carries a trade
off.
When it comes to the issue of mass identification, we have to begin with
something that people carry such as a Passport, Driving License or business
ID card and something that they know such as a password or specific knowledge.
This needs to be coupled with something that they are – such as their fingerprint
- to tighten security.
Biometric security
A lot has been said about Smart ID Cards and Biometric security since 11th
September. The truth is that biometric security – fingerprint recognition,
facial recognition, voice recognition - is not 100% accurate. It can only
be used as an adjunct and not the mainstay.
The whole issue of authentication, confidentiality, data integrity and non-repudiation
of bona fide presence, communications and transactions is a critical issue
and has to be solved through a multi-pronged approach.
Human intelligence
The next question to consider is how does one deploy people with the Knowledge
Management and Analysis Tools to outsmart the malevolent people who are one
step ahead and constantly figure out ways to outsmart the system?
The reality is that 70% of all complex attacks take place through insider
knowledge. and assistance and not political activists who go it alone. More
attention needs to be given to the value of human intelligence, where the
information is collected in situ at the grass roots level. When guaranteeing
the security of large digital systems the only way forward is to combine knowledge
management and analysis tools with human intelligence via managed security
services.
The full text of DK Matai’s speech is available at: intelligence.unit@mi2g.com