Jim Kouri
Wikileaks retaliation perpetrated by "hacktivists"
FacebookTwitter
By Jim Kouri
December 12, 2010

Domestic and foreign terrorist organizations, foreign intelligence actors, and criminal enterprises are increasingly using encryption technology to secure their communications and to exercise command and control over operations and people without fear of surveillance.

This week, a new threat emerged in the world of cybersecurity: "hacktivists" have openly launched retaliatory attacks on businesses, organizations and even governments, shutting down their websites for hours or days, in protest over actions taken against Wikileaks founder Julian Assange.

"We are witnessing a cyber war, the likes of which have not yet been seen," said Randall Nichols, professor and director of the cybersecurity programs at Utica College. "But the reality is that this is the battlefield of the present and the future."

The WikiLeaks' posting of stolen classified information has highlighted the tension between the intelligence community's strategy of "share to win" and the necessity to enforce "need to know."

Commanders in the field understand the advantage that comes from sharing intelligence and information and they do not want to give up that capability, according to Jim Garamone, an American Forces Press Service staffer.

Since the Wikileaks incidents, the Pentagon has put in place methods to minimize such thefts of classified materials. "It is now much more difficult for a determined actor to get access to and move information outside of authorized channels," Pentagon spokesman Bryan Whitman said in a written statement following publication of news articles on the documents Sunday.

The theft of the materials traces to the lack of sharing of information and intelligence prior to and after the September 11, 2001 terrorist attacks. The commission studying the environment at the time found that agencies weren't sharing enough information with each other.

The cyber threat confronting the United States is rapidly increasing as the number of actors with the tools and abilities to use computers against the United States or its interests is rising. The country's vulnerability is escalating as the US economy and critical infrastructures become increasingly reliant on interdependent computer networks and the World Wide Web. Large scale computer attacks on US critical infrastructure and economy would have potentially devastating results.

Cyber threats fall into two distinct categories: threats affecting national security that emerged with Internet technology, such as cyber terrorism, foreign-based computer intrusions and cyber theft of sensitive data; and traditional criminal activity facilitated by computers and the Internet, such as theft of intellectual property, online sexual exploitation of children, and Internet fraud.

In both categories, cyber attacks, intrusions, illicit file sharing, and illegal use of cyber tools are the basic instruments used by perpetrators. Domestic and foreign terrorist organizations, foreign intelligence actors, and criminal enterprises are increasingly using encryption technology to secure their communications and to exercise command and control over operations and people without fear of surveillance. The Federal Bureau of Investigation must be able to identify and penetrate the command and control elements of these organizations and actors.

Recognizing the international aspects and national economic implications of cyber threats, the FBI created a Cyber Division at the headquarters level to manage and direct this developing program. The rapid evolution of computer technology, coupled with the creative techniques used by foreign intelligence actors, terrorists, and criminals, requires investigators and computer security professionals to have highly specialized computer-based skills.

The FBI Cyber Program uses a centralized, coordinated strategy to support crucial counterterrorism, counterintelligence, and criminal investigations whenever aggressive technical investigative assistance is required. The Cyber Program also targets major criminal violators with a cyber nexus.

The FBI must increase its capability to identify and neutralize enterprises and individuals who illegally access computer systems, spread malicious code, or support terrorist or state-sponsored computer operations. The Bureau must proactively investigate counterterrorism, counterintelligence, and criminal investigative cyber related threats having the highest probability of threatening national security. To do so requires the FBI to constantly upgrade its skills and technology to meet the evolving threat.

© Jim Kouri

 

The views expressed by RenewAmerica columnists are their own and do not necessarily reflect the position of RenewAmerica or its affiliates.
(See RenewAmerica's publishing standards.)


Jim Kouri

Jim Kouri, CPP is currently fifth vice-president of the National Association of Chiefs of Police... (more)

Subscribe

Receive future articles by Jim Kouri: Click here

More by this author

September 10, 2017
Trump Justice: 'Dreamer' wanted for murder nabbed by feds in NJ and extradited


July 26, 2017
NJ 12-year-old's suicide a plea for cyber-bullying law: GOP candidate Heather Darling


June 12, 2017
Obama hampered law enforcement investigation of Iranian terrorism funding


June 2, 2017
Prez of Young Democrats and Mayor de Blasio staffer busted for kiddie porn; one victim 6-mos. old


May 29, 2017
The conservative approach to taxation and a healthy business climate


May 24, 2017
U.S. intelligence reports warn of cyber "Cold War"


March 3, 2017
Media attack Trump's terrorism expert Dr. Sebastian Gorka


December 23, 2016
Trump's border wall: The bill was passed and signed into law


December 22, 2016
Dem lawmakers demand commission to probe Trump-Russia conspiracy


December 14, 2016
Outraged Vets: VA hospital death touted as proof of Obama and Democrats indifference


More articles

 

Stephen Stone
HAPPY EASTER: A message to all who love our country and want to help save it

Stephen Stone
The most egregious lies Evan McMullin and the media have told about Sen. Mike Lee

Siena Hoefling
Protect the Children: Update with VIDEO

Stephen Stone
FLASHBACK to 2020: Dems' fake claim that Trump and Utah congressional hopeful Burgess Owens want 'renewed nuclear testing' blows up when examined

Cliff Kincaid
They want to kill Elon Musk

Jerry Newcombe
Four presidents on the wonder of Christmas

Pete Riehm
Biblical masculinity versus toxic masculinity

Tom DeWeese
American Policy Center promises support for anti-UN legislation

Joan Swirsky
Yep…still the smartest guy in the room

Michael Bresciani
How does Trump fit into last days prophecies?

Curtis Dahlgren
George Washington walks into a bar

Matt C. Abbott
Two pro-life stalwarts have passed on

Victor Sharpe
Any Israeli alliances should include the restoration of a just, moral, and enduring pact with the Kurdish people

Linda Kimball
Man as God: The primordial heresy and the evolutionary science of becoming God

Sylvia Thompson
Should the Village People be a part of Trump's Inauguration Ceremony? No—but I suspect they will be

Jerry Newcombe
Reflections on the Good Samaritan ethic
  More columns

Cartoons


Click for full cartoon
More cartoons

Columnists

Matt C. Abbott
Chris Adamo
Russ J. Alan
Bonnie Alba
Chuck Baldwin
Kevin J. Banet
J. Matt Barber
Fr. Tom Bartolomeo
. . .
[See more]

Sister sites