FBI Director says ISIS Could Cyberattack the US

mcrep1.jpg

ISIS is “waking up” to the idea of using sophisticated malware to cyberattack critical infrastructure in the US, FBI Director James Comey said recently.
“Logic tells me it’s coming,” and that the terror group is “looking into” whether it is capable of pulling off such attacks, Comey said at the Cybersecurity Law Institute at Georgetown University. 
Islamic terrorists are, as Comey says, stoking alarm with threats of an all-out cyber crusade against the United States, and experts say the warnings should be taken seriously.
Hackers claiming affiliation with the Islamic State in Iraq and Syria (ISIS) released a video recently vowing an “electronic war” against the United States and Europe and claiming access to “American leadership” online.
“Praise to Allah, today we extend on the land and in the Internet,” a faceless, hooded figure said in Arabic. “We send this message to America and Europe: we are the hackers of the Islamic State and the electronic war has not yet begun.”

Over the last two years, Comey said there has been more attention paid to potential cyberattacks against the US, and although he hasn’t seen them yet, “it just makes too much sense” to see destructive malware end up in the hands of terrorists.
Comey pointed to a “layer cake” of threats, with nation-states at the top and common criminals at the bottom. The threat of terror groups adopting cyber tactics usual carried about by China or North Korea is most concerning, he said.
“Destructive malware is a bomb. And terrorists want bombs” Comey said. And while it may be difficult for a terrorist to physically enter the US, they can do so online in an instant.
Comey also discussed the struggle of curbing the influence of ISIS on the Internet, calling social media “the intersection where cyber and counterterrorism merge.” Admiral Mike Rogers, the head of US Cyber Command, commented that a shift by ISIS of using cyber capabilities not just for recruitment but as a weapons system is a “great concern” to the National Security Agency.
The FBI is also seeing an increase in the encryption of operational communications between terrorists and potential recruits online. Despite a court order that would allow investigators to obtain devices and view communications, many of those communications have moved to encrypted platforms that hinder them from reading.
While Comey feels that there are societal benefits when it comes to encryption and the privacy of citizens online, the costs can leave intelligence communities with less information to stop a potential terror plot, or what is referred to by the FBI as “going dark.” This has led to a “collision,” according to Comey, where authorities have to balance the “important interest in privacy and important interest in public safety.”
Fox News:  http://bit.ly/1FHWKks

« UK Rewrites Hacking Laws to Give GCHQ Immunity
Cyber Crime on a Global Scale »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

Cytracom

Cytracom

Cytracom delivers powerful yet intuitive solutions that enable MSPs and ITSPs to meet the challenges of security, compliance, and connectivity.