FBI Director says ISIS Could Cyberattack the US

mcrep1.jpg

ISIS is “waking up” to the idea of using sophisticated malware to cyberattack critical infrastructure in the US, FBI Director James Comey said recently.
“Logic tells me it’s coming,” and that the terror group is “looking into” whether it is capable of pulling off such attacks, Comey said at the Cybersecurity Law Institute at Georgetown University. 
Islamic terrorists are, as Comey says, stoking alarm with threats of an all-out cyber crusade against the United States, and experts say the warnings should be taken seriously.
Hackers claiming affiliation with the Islamic State in Iraq and Syria (ISIS) released a video recently vowing an “electronic war” against the United States and Europe and claiming access to “American leadership” online.
“Praise to Allah, today we extend on the land and in the Internet,” a faceless, hooded figure said in Arabic. “We send this message to America and Europe: we are the hackers of the Islamic State and the electronic war has not yet begun.”

Over the last two years, Comey said there has been more attention paid to potential cyberattacks against the US, and although he hasn’t seen them yet, “it just makes too much sense” to see destructive malware end up in the hands of terrorists.
Comey pointed to a “layer cake” of threats, with nation-states at the top and common criminals at the bottom. The threat of terror groups adopting cyber tactics usual carried about by China or North Korea is most concerning, he said.
“Destructive malware is a bomb. And terrorists want bombs” Comey said. And while it may be difficult for a terrorist to physically enter the US, they can do so online in an instant.
Comey also discussed the struggle of curbing the influence of ISIS on the Internet, calling social media “the intersection where cyber and counterterrorism merge.” Admiral Mike Rogers, the head of US Cyber Command, commented that a shift by ISIS of using cyber capabilities not just for recruitment but as a weapons system is a “great concern” to the National Security Agency.
The FBI is also seeing an increase in the encryption of operational communications between terrorists and potential recruits online. Despite a court order that would allow investigators to obtain devices and view communications, many of those communications have moved to encrypted platforms that hinder them from reading.
While Comey feels that there are societal benefits when it comes to encryption and the privacy of citizens online, the costs can leave intelligence communities with less information to stop a potential terror plot, or what is referred to by the FBI as “going dark.” This has led to a “collision,” according to Comey, where authorities have to balance the “important interest in privacy and important interest in public safety.”
Fox News:  http://bit.ly/1FHWKks

« UK Rewrites Hacking Laws to Give GCHQ Immunity
Cyber Crime on a Global Scale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Gordian Networks

Gordian Networks

Gordian Networks offers complete managed IT services and IT support for small to large businesses.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

Hubble

Hubble

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses.

Vantor

Vantor

Vantor is a Managed Security Services Provider (MSSP) that specializes in providing outsourced, managed cybersecurity services.