Cyber-Terrorism

Download Report

Transcript Cyber-Terrorism

Cyber-Terrorism Australia ARF Seminar on Cyber-terrorism Busan 16 – 19 October 2007

What is Cyber-Terrorism?

• An action or threat of action which seriously interferes with, seriously disrupts, or destroys, an electronic system including, but not limited to information, telecommunications or financial systems.

Security Legislation Amendment (Terrorism) Act 2002

What is Cyber-Terrorism?

• The action is done or the threat is made with the intention of: – advancing a political, religious or ideological cause; and – coercing, or influencing by intimidation, the government of the Commonwealth or a State, Territory or foreign country (or part of); or – intimidating the public or a section of the public.

Security Legislation Amendment (Terrorism) Act 2002

What is Cyber-Terrorism?

• The action must cause: – serious physical harm to a person; or – serious damage to property; or – a person’s death; or – endanger a person’s life; or – create serious risk to public health or safety.

Security Legislation Amendment (Terrorism) Act 2002

Example – Maroochy Water

• Act of sabotage on Maroochydore sewerage treatment system in 2000 • SCADA system manipulated • One of only a handful of confirmed incidents of critical infrastructure sabotage by cyber attack • Not of sufficient scale or motivation to constitute cyber-terrorism

Challenges of New Technology

• Technological Convergence – Data, voice and video sharing over a single comms infrastructure – Reduces diversity & increases dependence upon core networks – Increases opportunities for cyber-terrorism – Denial of service in addition to risk of data manipulation

Cyber-Terrorism Capabilities

• Terrorist groups making increasing use of Internet and other technologies.

• Increasing links between terrorists and cyber criminals – Recent terrorist events funded through online fraud?

– May be increasing the computer skills of terrorist groups and access to skilled programmers • Terrorist groups expanding recruitment to people studying maths, computer science and engineering

What is Terrorist Use of the Internet?

• Terrorist use of the internet is different from Cyber-terrorism • Concerns terrorist use of Information Communications Technology (ICT) to facilitate and maximise the impact of real world, traditional, terrorist actions as well as a means of influencing individuals and communities.

The Internet as a Source of Radicalisation

• The internet is a powerful tool to influence people.

• Terrorist groups are increasingly using the internet to spread propaganda, radicalising and recruiting individuals by indoctrinating them with extremist ideologies.

The Internet as an Operational Tool for Terrorists

• Computer Mediated Communications (CMC) facilitates real world terrorist operations by making them cheaper, faster and more secure.

The Internet as a “Force Multiplier” for Terrorist Actions

• By showing graphic images, such as beheadings and IED attacks terrorist groups are engaging in a form of psychological warfare against their target audience.

• The internet and other global media serves as ‘force multiplier’ for terrorist actions.

Protection of Australia’s NII

• Australian Government is committed to protecting Australia’s critical information and physical infrastructure

Critical Infrastructure Protection Modelling and Analysis (CIPMA)

• Goals • Business-Government partnership

Protection of Australia’s NII

• Australian Government’s objective – to create a trusted and secure electronic operating environment • The E-Security National Agenda • Joint Operating Arrangement

Protection from Cyber Attack

• Encryption • Firewalls & intrusion detection products • Virus protection software • Password control & protection • Internal security policies • Patching security vulnerabilities quickly • Information sharing on good practice • Isolation of critical systems

Conclusion

• No instance of cyber-terrorism to date, however: – The threat of cyber-terrorism is increasing – Remotely controlled systems are increasing the attraction – Vulnerabilities are increasing while costs of attack are decreasing – Interdependencies are not well understood • Threat must be acknowledged and addressed

[email protected]

(General CIP matters) www.tisn.gov.au

(Trusted Information Sharing Network website) www.nationalsecurity.gov.au (A-G’s website on national security)

THANK YOU