What A ‘Cyber 9/11’ Would Look Like

The United States has been beset by hackers who have plundered the country’s intellectual property and meddled with its political system. But the worst could be yet to come in the form of a “cyber 9/11″, a term often invoked but rarely defined.

Recently, two security experts speaking at Fortune’s Brainstorm Tech-conference in Aspen, Colo. this week shared some unsettling specifics.

Jen Easterly, who helps lead cyber security defenses at Morgan Stanley, cited the powerful hacking tools that are already being deployed by the likes of North Korea to attack the international banking system. She warned a broader attack of this nature could create financial instability, and that the tools could be deployed against other critical targets.

“What’s a cyber 9/11? My scary scenario is non-state actors getting hold of these capabilities, and attacking the air traffic control system and the energy system,” said Easterly, who served in the army for 22 years and served as a counter-terrorism advisor to President Obama.

Jay Kaplan, CEO of cyber defense firm Synack, warned a cyber 9/11 could involve terrorists hitting not only the energy grid, but also water systems. He added that the US had been attacked since “the start of the Internet” but that the country’s current lack of preparedness could expose it an unprecedented cyber disaster.

While any worst case attack is likely to come from non-state actors (i.e. terrorists), Easterly and Kaplan say the cyber-threat from countries, especially China, Russia, and North Korea, remains very real. Both echoed Director of National Intelligence, Dan Coats, who stated recently that warning lights “are blinking red again” and a cyber-attack is imminent.

Contrary to the doubt raised by President Trump over Russian interference in the 2016 election, both experts share the view of the intelligence community that such interference definitely occurred.

“There is incontrovertible evidence of a nation state sponsored attack,” said Easterly, adding the goal was to sabotage the country’s fair and free elections, and that such attacks amount to an attack on our “cognitive infrastructure.”

Synack also noted that the country’s broad cyber vulnerabilities stem in large part from a lack of qualified people capable of defending companies and governments. He called for more training, pointing to China, which he says is building six universities for cyber education.

On a brighter note, Synack said US tech giants are doing a better job of working with intelligence agencies to address the problem of terrorists using popular websites to spread propaganda or plan attacks.
“Nobody wants terrorists on their platforms,” he said.

Fortune:

You Might Also Read: 

Deaths From Cyber Attacks:

Russia Will Keep Up Cyber Attacks For Geo-Political Influence:

A New Cold War Will Not Be Based On Hardware:

 

« Fraudsters £350k Spoof University Emails
Trump / Putin Summit Was A Magnet For Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.