Could Hackers Devastate the U.S. Economic System?
Jasper Paltridge edytuje tę stronę 1 dzień temu

zhihu.com
In the newest "Die Hard" movie, "Dwell Free or Die Laborious," Bruce Willis reprises his position as Detective John McClane. This time, he fights towards a shadowy criminal group that's utilizing Internet attacks to devastate America's infrastructure. McClane should cease the gang and rescue his kidnapped daughter in the method. That plot description obtained us wondering: Is it really attainable for a gaggle of hackers to cause financial or physical devastation in the United States? Cyber safety is turning into an important problem. Many media organizations and authorities officials rank it simply as grave a menace as terrorist assaults, nuclear proliferation and global warming. With so many business, authorities and non-public systems linked to the Web, the concern seems warranted. Many work in teams, and networks of black-market websites exist where hackers change stolen data and illicit applications. Credit-card knowledge is bought in bulk by "carders" and phishing scams are a rising concern.


Malware -- viruses, Trojan horse packages and worms -- generates more money than all the laptop safety industry, in response to some experts. Hackers are additionally distributed all around the world, many in nations like Romania that have plenty of Internet connectivity and unfastened enforcement of laws. Not too long ago, the British government released evidence that overseas intelligence companies, presumably in China, Korea and a few former Soviet states, have been hacking computer systems within the United Kingdom. Economic espionage includes attempting to undermine the financial activity of other international locations, typically by passing on stolen trade and trade secrets to pleasant or state-owned companies. Key employees, these who've entry to delicate info or government secrets and techniques, will be focused via virus-laden e-mails, infected CD-ROMS or Memory Wave Method sticks, or by hacking their computer systems. To respond to those threats, the European Union, G8 and many different organizations have arrange cybercrime task forces. In the United States, some native legislation enforcement organizations have electronic crime units and the FBI shares information with these models by means of its InfraGard program.


Great Britain thinks it is going through a menace, however ought to the United States be involved? Latest events in Estonia may very well shed some gentle on the situation.S. ­On April 27, 2007, the Estonian authorities moved a controversial Soviet-era World Battle II memorial from a square within the capital metropolis of Tallin to a extra secluded location. Protests erupted in Estonia and Russia, where Estonia's Moscow embassy was blockaded. The Russian government protested vociferously and issued threats. Weeks of cyber assaults followed, focusing on government and private Web pages. Some assaults took the type of distributed denial of service (DDoS) assaults. Hackers used lots of or thousands of "zombie" computer systems and pelted Estonian Web sites with hundreds of requests a second, boosting traffic far past normal ranges. At first, many people thought the assaults have been being dedicated by the Russian government, inflicting some pundits to label the occasions the primary "cyber conflict." It's now believed that the Russian government did not immediately take part within the assaults, although they did contribute plenty of indignant rhetoric.


Instead, incensed Russians were seemingly behind a lot of the assaults. The Estonian cyber attacks weren't larger than other DDoS assaults, however they were capable of shut down some websites for a time. The government didn't lose any infrastructure, however the occasions proved extraordinarily time consuming, expensive to combat and indicative of weaknesses in Estonia's cyber safety. The Estonia cyber attacks weren't the first of their form. Beforehand different political grievances have spilled over into hacker feuds. Indian and Pakistani hackers have in the past launched barrages of viruses and DDoS attacks as part of the lengthy-standing tensions between those nations. Israeli and Memory Wave Palestinian hackers have launched tit-for-tat attacks, defacing each others' Web pages. But the weeks of cyber attacks suffered by Estonia appear unique as a result of they, for a time, consumed the affairs of a whole government and drew the attention of the world. Estonia, a country thought-about to be particularly "wired," weathered its cyber attacks with some economic and governmental disruption, but without vital or lengthy-time period injury.


How would the United States fare in such a situation? Read on to search out out.S. These incidents embody labeled e-mails sent over unsecured networks, private computer systems used on authorities networks, set up of unapproved software program, leaks of categorised knowledge and problems with viruses and unsecured firewalls. Because of those and other failures, the government is responding. The DHS now has an Assistant Secretary for Cyber Security and Telecommunications, Greg Garcia. In early February 2006, the U.S. One hundred fifteen companions in 5 international locations, performed a set of cyber struggle video games referred to as Cyber Storm. This large-scale simulation included main firms, authorities agencies and Memory Wave safety organizations. Cyber Storm served as a take a look at of what would occur in the occasion of cyber attacks towards necessary authorities, enterprise and personal Web pages. The faux assaults prompted blackouts in 10 states, contaminated business software with viruses and induced important online banking networks to fail. The exercise dealt with defending in opposition to and responding to the assaults as well as managing misinformation that may be spread by the attackers themselves.