blank

Voice of America ®

A Trusted Source of News & Information since 1942

About VOA | Contact VOA News

  • Thursday, 25 March 2010
  • Latest News:

Science and Technology

Cyber Attacks Growing, Diverse, Destructive

Users of a cyber cafe in China surfing the Internet

Users of a cyber cafe in China surfing the Internet

Share This

Related Articles

"If you want to do damage to a country, you have to bring things down in a way that makes the recovery time long." - Steve Lukasik

If you have ever received email, at some point you may have opened an attachment, only to find it infected your computer with a virus. Email is one of a growing number of ways that hackers use to gain control of personal computers.

With the help of a virus or malicious software hackers can even make personal computers part of a larger robot network or "botnet" – that can be operated remotely and used for broader attacks.


(Graphic illustration of how a botnet can spread)

According to Randy Vickers, acting director of the Computer Emergency Readiness Team (CERT), Department of Homeland Security, many home computers simply don't have adequate, or updated, security software.

“We know good and well that Grandma Smith isn't the bad guy,” said Vickers. “That computer just happened to be compromised and it's just one of the zombies in a botnet, it's one of the hot points that some malicious actor is using.”

[See United States Security and Economic Review Commission’s Annual Report to Congress (pdf)]

More technology, more opportunities for hackers

Computer experts note that just as quickly as technology expands, hackers find ways to exploit it. That is why security software updates are so important, whether on home computers or government and corporate systems.

 

Audio extras
Gewirtz: Why tracing attacks is so hard (1:39)
Gewirtz: Explains Denial of service attacks (2:29)
Gewirtz: What are viruses and worms? (2:05)
David Gewirtz is the head of the U.S. Strategic Perspective Institute which runs the Online Safety Foundation

 

Vickers points to the earlier lack of now-common safety features in cars, saying cyber security is something many companies add only as problems develop.

"The first car that was built, if you look at the... even something as sophisticated as the Model-T, didn't have seat belts, didn't have a windshield,” says Vickers. “You hit something and ... but over time what have we done? We've learned to anticipate, based on what we've learned in the past."

Steve Lukasik, a national security expert who looks at cyber attack scenarios, says that once hackers get into a network, the range of possibilities are limitless. [see Lukasik on Reducing Threats to Users of the Global Cyber Commons (pdf)]

"I mean it's like, once you get past a guard gate in a building or at a facility, unless there are other locks and security check points, you can go anywhere," Lukasik added.

Threats to critical infrastructure

One of the attack scenarios that Lukasik has studied in depth is a possible attack on infrastructure, such as a power plant and electrical grid.

"The essence of a cyber attack is to break things. Now that's somewhat different from what a lot of people are concerned about,” Lukasik adds. “But if you want to do damage to a country you have to bring things down in a way that makes the recovery time long."

A 2007 U.S. government video of a simulated hacker attack on the electrical power grid shows just how destructive such an event could be.


(Video of turbine reaction to simulated hacker attack)

In the video, the massive turbine first spews out white smoke, then jolts suddenly, and then more smoke comes pouring out as the system is brought to a complete halt. Lukasik says that one attack like this might not be a big problem, but many attacks could be catastrophic.

"If you were to do this 500 times in the course of a day or week or something, the electric power generator manufacturing capacity would say, 'Thank you very much, we'll put you on a list and I think we'll be able to deliver something by May of 2013'," said national security expert Steve Lukasik.

He says that while making preparations to defend critical infrastructure systems such as the electrical and communication system is crucial, there is no one solution in the fight against cyber threats.

Winning, experts say, is more a matter of shoring up critical infrastructure, having the agility to adapt and keep up with attacks as they arise. Fighting cyber threats, they say, is a constant battle that never ends.

Comments (1)

23-03-2010 Blake (USA)

Suggesting that VOA also include articles or links on how to protect against piracy and hacking... how are computer Operating Systems responsible for allowing security loopholes in the first place? Are some Operating Systems more secure and less vulnerable than others, and why? Are the program developers truly interested in the security of the people they sell their programs to?

Post Your Comment

* Required



By using this form you agree to the following: All comments will be reviewed before posting. Be aware - not all submissions will be posted. VOA has the right to use your comments worldwide in any VOA produced media. Terms & Conditions