FBI Director says ISIS Could Cyberattack the US

mcrep1.jpg

ISIS is “waking up” to the idea of using sophisticated malware to cyberattack critical infrastructure in the US, FBI Director James Comey said recently.
“Logic tells me it’s coming,” and that the terror group is “looking into” whether it is capable of pulling off such attacks, Comey said at the Cybersecurity Law Institute at Georgetown University. 
Islamic terrorists are, as Comey says, stoking alarm with threats of an all-out cyber crusade against the United States, and experts say the warnings should be taken seriously.
Hackers claiming affiliation with the Islamic State in Iraq and Syria (ISIS) released a video recently vowing an “electronic war” against the United States and Europe and claiming access to “American leadership” online.
“Praise to Allah, today we extend on the land and in the Internet,” a faceless, hooded figure said in Arabic. “We send this message to America and Europe: we are the hackers of the Islamic State and the electronic war has not yet begun.”

Over the last two years, Comey said there has been more attention paid to potential cyberattacks against the US, and although he hasn’t seen them yet, “it just makes too much sense” to see destructive malware end up in the hands of terrorists.
Comey pointed to a “layer cake” of threats, with nation-states at the top and common criminals at the bottom. The threat of terror groups adopting cyber tactics usual carried about by China or North Korea is most concerning, he said.
“Destructive malware is a bomb. And terrorists want bombs” Comey said. And while it may be difficult for a terrorist to physically enter the US, they can do so online in an instant.
Comey also discussed the struggle of curbing the influence of ISIS on the Internet, calling social media “the intersection where cyber and counterterrorism merge.” Admiral Mike Rogers, the head of US Cyber Command, commented that a shift by ISIS of using cyber capabilities not just for recruitment but as a weapons system is a “great concern” to the National Security Agency.
The FBI is also seeing an increase in the encryption of operational communications between terrorists and potential recruits online. Despite a court order that would allow investigators to obtain devices and view communications, many of those communications have moved to encrypted platforms that hinder them from reading.
While Comey feels that there are societal benefits when it comes to encryption and the privacy of citizens online, the costs can leave intelligence communities with less information to stop a potential terror plot, or what is referred to by the FBI as “going dark.” This has led to a “collision,” according to Comey, where authorities have to balance the “important interest in privacy and important interest in public safety.”
Fox News:  http://bit.ly/1FHWKks

« UK Rewrites Hacking Laws to Give GCHQ Immunity
Cyber Crime on a Global Scale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

GlassSquid

GlassSquid

glasssquid.io simplifies your cyber security job search. We want to help you find your next perfect fit opportunity by removing the confusion.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.