The Next 9/11 Will Be A Cyber Attack

The FBI has compared recent cyber attacks on US government and corporate entities to the same level of threat presented by the 9/11 terrorist attack. 

US Admiral James Stavridis,  ex- NATO Supreme Allied Commander for Europe, has echoed this perspective in a recent TV interview. “We’re headed toward a cyber Pearl Harbor, and it is going to come at either the grid or the financial sector... we need to think about this cyber attack as a pandemic.”

Now, as tension in Ukraine grows, some security experts are saying that a cyber attack of devastating proportions is only a matter of time.

The rapid transformation from office-based activity to remote work prompted by the Coronavirus pandemic has demanded the adoption of robust cyber security protocols to mitigate the risk many organisations face from  malware and ransomware.

Pressure Points On Critical Infrastructure 

The World Economic Forum’s Global Risk Report ranks cyber security failure among the greatest threats facing humanity within the next decade, saying “…attackers could trigger a breakdown in the systems that keep societies functioning.” Industry and critical infrastructure which need to be running continuously - such as nuclear power plants, banking operations, intensive care units in hospitals and Coronavirus vaccine distribution - could be potential targets for hackers, whether they are small groups or state actors. 

Concerns exist that nation-state actors will test the pressure points of critical infrastructure through hacks with the aim of sowing seeds of more chaos by disrupting the supply chains during future periods of geo-political conflict. At such times, targeting food and energy supplies of an adversary will be a classic strategy to begin with. 

Escalating Concerns

The hacking of the Colonial Pipeline controlling  45 percent of fuel in the Eastern US, led to panic buying of petrol by consumers which in turn escalated fuel prices on the entire Eastern coast.  Around the world, recent cyber attacks on critical infrastructure in Australia and Israel the vulnerabiltiy of some of the computer operated distribution networks upon which nations rely.  

These are various  scenarios that concern independent cyber security experts and they have three common characteristics: 

  • Physical attacks that shut off or damage some aspect of critical services.
  • Financial attacks that spin out of control and lead to bank runs. 
  • Disinformation via manipulating data and information in a way that undermines trust in critical national institutions.

Today, its not hard to imagine a scenario  in which a cyber attack could shut down basic services such as electricity or water supply, which can and will adversely affect millions of people. 

The Challenge Facing Policymakers

Political leaders all over the world are waking up to the serious threats posed by cyber warfare. Huawei's 5G technology is an example where companies all over the globe, policy makers and governments, especially of Denmark, India, Japan, and South Africa have raised issues about the geopolitical neutrality and the subsequent threat to sovereignty from private corporations involved within the cyber realm. 

Some countries have issued a complete ban on Huawei 5G communications equipment, although the Chinese the company continues to gains more ground by virtue of low pricing for its innovative technology 

Technology innovation is not likely to slow and indeed digital advances are likely to accelerate. Super-computing and quantum computing will push change ahead and enable even more powerful digital applications. Only by focusing on controlling technological advances will vulnerable nations be able to address the  problems of misinformation, personal privacy, cyber security and disinformation. 

WEF:     Brookings:      Economic Times:    Guardian:       CNBC:      Biometrica

You Might Also Read: 

Cyber Warfare Is The New Frontier:

 

 

« Is Cyber Training Fit For Purpose?
NATO & Ukraine Agree Deeper Cyber Co-operation »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CyTech Services

CyTech Services

CyTech provides unique services and solutions complemented with professional subject matter experts to both the Federal and Commercial sectors.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

BooleBox

BooleBox

Boolebox is the innovative suite of enterprise data protection applications that preserve the integrity and confidentiality of data from any unauthorized access.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Prima Cyber Solutions (PCS)

Prima Cyber Solutions (PCS)

Prima Cyber Solutions is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Global Market Innovators (GMI)

Global Market Innovators (GMI)

Global Market Innovators (GMI) delivers secure technology solutions to organizations in need.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Tausight

Tausight

Tausight is an AI-Powered patient data security startup with a mission of reducing healthcare cyber incidents using a more proactive, risk management philosophy.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

VCI Global

VCI Global

VCI Global is a diversified holding company. Through its subsidiaries, it focuses on consulting, fintech, AI, robotics, and cybersecurity.