Movie Making Image Gallery Image TM and © Twentieth Century Fox Film Corporation. All rights reserved. 'Live Free or Die Hard' follows Detective John McClane (Bruce Willis) as he faces off against a group of terrorists trying to dismantle the United States’ technological framework. Discover more behind-the-scenes movie images.In the latest 'Die Hard' film, 'Live Free or Die Hard,' Bruce Willis returns as Detective John McClane. This time, he battles a secretive criminal organization launching Internet-based attacks to destroy America's infrastructure. McClane must thwart the plot and save his kidnapped daughter. This plot had us wondering: Could a group of hackers actually cause economic or physical chaos in the United States?
Cybersecurity has become a critical issue. Many news outlets and government leaders now consider it as serious a threat as terrorism, nuclear proliferation, and climate change. With so many commercial, governmental, and private systems interconnected via the Internet, this concern appears well-founded.
Further fueling the concern is that today's hackers are more coordinated and powerful than ever before. Many operate in organized groups, with networks of black-market sites facilitating the exchange of stolen data and illegal software. Credit-card information is often sold in bulk by 'carders,' while phishing schemes continue to grow. Malware—viruses, Trojan horses, and worms—now generates more revenue than the entire computer security industry, according to some experts. Hackers are also scattered across the globe, with many based in countries like Romania, where Internet connectivity is abundant and legal enforcement is weak.
The British government recently revealed evidence that foreign intelligence agencies, possibly from China, Korea, and some former Soviet states, were hacking computers in the United Kingdom. 'Economic espionage' was thought to be one of the driving forces behind these attacks [Source: Computer Weekly]. Economic espionage involves efforts to harm the economic activities of other nations, sometimes by transferring stolen trade secrets to allied or state-owned companies. Key employees with access to sensitive data or government secrets can be targeted through virus-infected e-mails, contaminated CD-ROMs or memory sticks, or by directly hacking their computers.
In response to these cyber threats, the European Union, G8, and several other organizations have established cybercrime task forces. In the United States, some local law enforcement agencies have electronic crime units, and the FBI shares information with these units through its InfraGard program.
While Great Britain sees itself as facing a cyber threat, should the United States be equally worried? Recent incidents in Estonia could provide some insight into the situation.
Cyber Attacks in Estonia
NATO assisted Estonia in defending against the cyber attacks and has pledged to collaborate with member nations to enhance cyber security.
Image courtesy NATOOn April 27, 2007, the Estonian government relocated a contentious Soviet-era World War II memorial from a public square in the capital, Tallin, to a more remote site. This action sparked protests in both Estonia and Russia, with Estonia's Moscow embassy being blockaded. The Russian government issued strong protests and threats. (Estonia had been occupied by the Soviet Union for much of the Cold War, and the country is home to a significant Russian minority.)
Following this, weeks of cyber attacks targeted both government and private websites. Some of these attacks were distributed denial of service (DDoS) attacks, where hackers used hundreds or thousands of 'zombie' computers to bombard Estonian websites with thousands of requests per second, overwhelming the sites with traffic.
The Estonian government compared these cyber attacks to a terrorist assault. Initially, many speculated that the Russian government was behind the attacks, with some even dubbing the event the first 'cyber war.' However, it is now understood that the Russian government did not directly engage in the attacks, although it did contribute to the heated rhetoric. Instead, it was likely outraged Russian individuals who were responsible for most of the attacks.
While the Estonian cyber attacks were not larger in scale than other DDoS incidents, they were disruptive enough to bring down certain sites temporarily. The government did not suffer any loss of infrastructure, but the attacks proved to be incredibly time-consuming, costly to address, and highlighted significant vulnerabilities in Estonia's cyber security systems.
The Estonian cyber attacks were not the first of their kind. In the past, political tensions have often spilled into cyber warfare. Indian and Pakistani hackers have launched virus and DDoS attacks amid their ongoing conflict, while Israeli and Palestinian hackers have exchanged attacks, defacing each other's websites. However, what set the Estonian attacks apart was the duration of the assault, which at one point completely consumed the operations of the Estonian government and captured global attention.
Estonia, a nation known for its advanced digital infrastructure, experienced significant but not catastrophic disruption from its cyber attacks. While it faced some economic and governmental setbacks, the country avoided severe or lasting damage. The question remains: How would the United States handle such an assault? Keep reading to find out.
U.S. Cyber Security
Detective McClane teams up with young hacker Matt Farrell (Justin Long) to combat a terrorist-hacker organization.
Image TM and © Twentieth Century Fox Film Corporation.On April 19, 2007, the Congressional Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, part of the Homeland Security Subcommittee, learned that systems at the Departments of Commerce and State were compromised in 2006. Scott Charbo, the Chief Information Officer at the Department of Homeland Security, might lose his job due to "844 security-related incidents" at the DHS in 2005 and 2006 [Source: News.com]. These incidents involved classified e-mails transmitted over unsecured networks, personal computers on government networks, unauthorized software installations, leaks of classified data, and problems with viruses and unprotected firewalls. The DHS earned a "D" on its annual computer security report card, a slight improvement over the failing grades it received from 2003 to 2006. The federal government as a whole received a C-minus, up from a D-plus the previous year.
In response to these failures, the government is taking action. The DHS now has an Assistant Secretary for Cyber Security and Telecommunications, Greg Garcia. In early February 2006, the U.S. government, along with 115 partners across five countries, participated in a series of cyber war games called Cyber Storm. This extensive simulation involved major corporations, government agencies, and security organizations. Cyber Storm was designed to test the response to cyber attacks targeting critical government, business, and private websites. The simulated attacks resulted in blackouts across 10 states, viruses infecting commercial software, and major online banking failures. The exercise focused on defending against the attacks and managing misinformation spread by the attackers. Cyber Storm II is set for 2008. Meanwhile, at Barksdale Air Force Base in Louisiana, 25,000 military personnel work on electronic warfare, network security, and the defense of the nation's Internet infrastructure.
In the event of a large-scale cyber attack against the U.S., intelligence agencies, the Department of Defense, military forces, and units like the one at Barksdale Air Force Base would likely be the first to respond. The US-CERT (United States Computer Emergency Readiness Team), established in 2003, would also be a key player. US-CERT is responsible for safeguarding Internet infrastructure and defending against cyber threats.
Next, we will explore the potential for a cyber attack on U.S. soil.
Cyber Attacks in the United States
Image used under the GNU Free Documentation License. Despite how action films or spy novels might portray things, it's simply not possible for hackers to cause widespread destruction at a major facility like the Hoover Dam.The United States certainly has its fair share of security vulnerabilities in its Internet infrastructure, despite ongoing efforts to improve cybersecurity. But do these gaps in security lead to catastrophic, 'Die Hard'-style chaos? Not really. No one perished during the cyber attacks on Estonia, and there’s no record of anyone being killed due to a cyber attack or a computer breach. While some terrorist groups have voiced interest in launching Internet-based strikes, the real concerns stem from criminal organizations extorting companies for money and frustrated hackers trying to make a point, much like what occurred in Estonia.
With enhanced security measures, backup systems, monitoring software, and diligent human oversight, large-scale physical casualties from cyber attacks have become highly unlikely. Military systems, in particular, are regarded as highly secure, meaning it's not a situation where an 11-year-old from Beijing can launch ICBMs. Moreover, nuclear weapons and other critical systems are deliberately kept offline, not even connected to the Internet [Source: Washington Monthly].
Estonia demonstrated the very real possibility of economic damage, particularly if hackers manage to disrupt power grids or break into major financial institutions or the stock market. However, while gaining access to a system or network might be easier for a hacker, causing significant damage from within is another story. Thanks to the expertise of skilled staff and proprietary systems at utilities and other essential infrastructure, most issues can be swiftly addressed. For now, the main threats to cyber security continue to come from worms, viruses, Trojan horses, and the exploitation of security vulnerabilities, all of which annually cost private industries billions in losses.
