- Deadly N.Y. train derailment leads to Senate call for cameras at tracks
- WWII vet, 90, en route to Pearl Harbor event booted from flight
- SWAT team at Phoenix hospital as armed man clears emergency room
- Kim Jong-un’s uncle dragged from political meeting, booted from party
- Big storm dumps snow on East Coast, travel dicey
- Thai prime minister dissolves Parliament, calls elections
- Hagel to meet with Pakistan’s prime minister
- Kiev: Riot police deployed near protest sites
- Elton John blasts Russia’s anti-gay laws during Moscow concert
- U.N.: Afghanistan slow to enforce law protecting women
Obama hits pause on U.S. action in face of crippling cyber strikes from Syria, Iran
Former U.S. officials and cybersecurity scholars say Syria has a demonstrated cyberattack capability and could retaliate against anticipated Western military strikes against Syria for its suspected chemical weapons attack against civilians in the country’s 2-year-old civil war.
“It’s foreseeable that [Syrian] state-sponsored or state-sympathetic hackers could seek to retaliate” against U.S., Israeli or Western interests, Michael Chertoff, a former secretary of Homeland Security, told The Washington Times on Wednesday.
“We have already seen regional cyberactors, such as the Syrian Electronic Army, conduct attacks on U.S. targets,” added Rep. James R. Langevin, Rhode Island Democrat and a member of the House Armed Services Committee and the Permanent Select Committee on Intelligence.
The Syrian Electronic Army has successfully attacked computer networks used by U.S. media outlets — hacking the Twitter account of The Associated Press this year and mostly knocking The New York Times website offline for 20 hours Tuesday and Wednesday.
Attackers penetrated the company that manages the paper’s Internet domain, NYTimes.com, according to reports in the computer security trade press.
Hackers can relatively easily hide their tracks from all but the most extensive and time-consuming forensic efforts, but the Syrian Electronic Army has publicly claimed these attacks. In online postings, the group of hacker activists, or “hacktivists,” claim to be motivated by Syrian patriotism and to act independently of the regime in Damascus.
“It can be difficult to distinguish between hackers who are sympathetic to a regime and those directly [state] sponsored or controlled,” said Mr. Chertoff, co-founder and chairman of the Chertoff Group, a global security advisory firm.
Islamic hackers whom U.S. officials have linked to Iran have launched a series of increasingly powerful cyberattacks against the websites of major U.S. banks for almost a year.
Large U.S. financial institutions probably have the best cybersecurity of any nongovernmental entity, yet their websites have been driven offline by repeated attacks.
A self-described hacktivist group called Izad din al Qassam has claimed responsibility for the attacks, which they announce in advance.
The group says the attacks are designed to punish the United States for an Internet video, “Innocence of Muslims,” made by an Egyptian-American Coptic Christian, which portrays Islam’s Prophet Muhammad as a killer and pedophile. The Obama administration tried to blame the video for the terrorist attack last year at a U.S. diplomatic compound in Libya that killed Ambassador J. Christopher Stevens and three other Americans.
But the kind of cyberattack that most alarms national security specialists took place a year ago and was aimed at the Saudi Arabian state oil company, Aramco.
A virus called Shamoon infected the company’s computer network and wiped data from more than 30,000 computers, effectively destroying all the information on the system.
A similar attack on a bank could destroy digital records of customer accounts.
Hackers also have demonstrated that they could take over computer control systems that operate chemical, electrical and water and sewage treatment plants. They also can hack into transportation networks.
“An aggressor nation or extremist group could gain control of critical switches and derail passenger trains, or trains loaded with lethal chemicals,” Leon E. Panetta, then CIA director, warned in a speech in New York last year.
“They could contaminate the water supply in major cities or shut down the power grid across large parts of the country.”
Specialists doubt that the Syrian Electronic Army has that kind of advanced capability, but it is always hard to tell, said Timothy Sample, who is a vice president at technology contractor Battelle Inc., which does cybersecurity work for U.S. intelligence and defense agencies and civilian clients.
“The barriers to entry for these kinds of capabilities are very low,” he said, adding that it is easy to buy cyberattack tools and hire hackers on the black market.
“It would be dangerous to rely on the proposition that any given attacker lacks a particular skill,” Mr. Sample added.
Cyberforensic specialists have documented the Syrian Electronic Army’s historic links to a computer society founded years ago by Syrian President Bashar Assad. The British Guardian newspaper has reported that the group is funded by Rami Makhlouf, a cousin of Mr. Assad’s and the owner of SyriaTel, a telecommunications and Internet service provider.
“Even if it is evident that Syria is behind an attack, they can deny it. We saw that in Estonia,” he said.
In 2007, in the midst of a bitter diplomatic dispute between Estonia and Russia, the small Baltic nation suffered a series of huge cyberattacks that knocked banks, government websites and other vital infrastructure offline. The attacks came from Internet addresses in Russia and were coordinated on public bulletin boards run by hackers and nationalist groups, but the Russian government denied any involvement.
Mr. Chertoff said U.S. policymakers were used to such dilemmas.
“There are often times we know [who has attacked us], but we can’t publicly prove it without revealing intelligence sources and methods. You have to decide whether to act on the basis of evidence you cannot reveal,” he said.
Any U.S. response to a Syrian attack might well not be visible, said Adam M. Segal, a cybersecurity scholar with the Council on Foreign Relations.
U.S. Cyber Command has said it has the ability reach back into attackers’ networks and “prevent these [kinds of] attacks from their source,” said Mr. Segal, “essentially doing defense through offense.”
Cyberattacks are now “an integral part of modern warfare,” said Mr. Langevin, who has led efforts in Congress to pass legislation designed to shore up the nation’s cyberdefenses.
“This is going to be a lingering problem,” Mr. Chertoff said.
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Tech companies call for an end to NSA online snooping
- New Internet security challenge arises for cybercops
- Britain eyes new powers to thwart Islamic extremists
- In global op, feds help seize websites selling fake goods
- Privacy board springs to life after NSA revelations
Latest Blog Entries
By Brahma Chellaney
Beijing's creeping aggression signals a challenge to U.S. presence in the Asian Pacific
- CURL: Obama tells a whopper on IRS scandal
- Lawmakers see 'false narrative' of Obama as a terrorist fighter
- EDITORIAL: Health care hardball
- 'Dude, I'm dreading that I will have to go': Czech prime minister on Mandela funeral
- South Carolina sheriff refuses to lower American flag for Nelson Mandela
- Obamas call to close Vatican embassy is 'slap in the face' to Roman Catholics
- FENNO: Mike Shanahan's empty words no salve to free-falling Redskins
- POWELL: The Fed's scandalous monetary policy
- As the unemployed wait, lawmakers debate about extended benefits
- Sen. Rand Paul: Supreme Court needs to re-examine Fourth Amendment
Independent voices from the The Washington Times Communities
Television commentary, reviews, news and nonstop DVR catch-up by Lisa King Dolloff and friends.
Film Reviews and Articles by Kevin Williams
Let it snow
White House pets gone wild!