FBI Director says ISIS Could Cyberattack the US

mcrep1.jpg

ISIS is “waking up” to the idea of using sophisticated malware to cyberattack critical infrastructure in the US, FBI Director James Comey said recently.
“Logic tells me it’s coming,” and that the terror group is “looking into” whether it is capable of pulling off such attacks, Comey said at the Cybersecurity Law Institute at Georgetown University. 
Islamic terrorists are, as Comey says, stoking alarm with threats of an all-out cyber crusade against the United States, and experts say the warnings should be taken seriously.
Hackers claiming affiliation with the Islamic State in Iraq and Syria (ISIS) released a video recently vowing an “electronic war” against the United States and Europe and claiming access to “American leadership” online.
“Praise to Allah, today we extend on the land and in the Internet,” a faceless, hooded figure said in Arabic. “We send this message to America and Europe: we are the hackers of the Islamic State and the electronic war has not yet begun.”

Over the last two years, Comey said there has been more attention paid to potential cyberattacks against the US, and although he hasn’t seen them yet, “it just makes too much sense” to see destructive malware end up in the hands of terrorists.
Comey pointed to a “layer cake” of threats, with nation-states at the top and common criminals at the bottom. The threat of terror groups adopting cyber tactics usual carried about by China or North Korea is most concerning, he said.
“Destructive malware is a bomb. And terrorists want bombs” Comey said. And while it may be difficult for a terrorist to physically enter the US, they can do so online in an instant.
Comey also discussed the struggle of curbing the influence of ISIS on the Internet, calling social media “the intersection where cyber and counterterrorism merge.” Admiral Mike Rogers, the head of US Cyber Command, commented that a shift by ISIS of using cyber capabilities not just for recruitment but as a weapons system is a “great concern” to the National Security Agency.
The FBI is also seeing an increase in the encryption of operational communications between terrorists and potential recruits online. Despite a court order that would allow investigators to obtain devices and view communications, many of those communications have moved to encrypted platforms that hinder them from reading.
While Comey feels that there are societal benefits when it comes to encryption and the privacy of citizens online, the costs can leave intelligence communities with less information to stop a potential terror plot, or what is referred to by the FBI as “going dark.” This has led to a “collision,” according to Comey, where authorities have to balance the “important interest in privacy and important interest in public safety.”
Fox News:  http://bit.ly/1FHWKks

« UK Rewrites Hacking Laws to Give GCHQ Immunity
Cyber Crime on a Global Scale »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.

Sublime Security

Sublime Security

Sublime is an adaptive email security platform that combines best-in-class effectiveness with unprecedented visibility and control.