Cyber Security: Where are we now and where are we headed?
June 10, 2015 by Dr. Rich Swier I recently had an extended conversation with John Jorgensen, founder and CEO of the Sylint Group, and USAF Brigadier General (Ret.) Charly Shugg, Sylint’s Chief Operations Officer, on where we are on cyber security and where we are headed. Both John and Charly understand that technology is ubiquitous. It is present, appearing and found everywhere. As technology expands so does the possibility of those with the necessary skills to use it for both good and evil. The Sylint Group is focused on combating the evil – the cyber war being conducted at every level from the individual to the nation state every moment of every day. The more we tune in, turn on and hook in to technology the greater the threat to individual privacy and freedom. Mr. Jorgensen believes the greatest future threat is from “chipping” but more about that later. What is the current threat?What most individuals think about when you say cyber security is protecting their personal information (e.g. credit cards, medical records, telephone and email conversations). For corporations it is about protecting their data, corporate processes and networks. For nation states, like the U.S., it is about protecting national assets such as the electrical grid, nuclear power plants, government websites and government secrets. Each sector has its unique needs but are these needs to provide cyber security being met? According to Mr. Jorgensen they are not. Mr. Jorgensen in his column “A New Age – The Cyber Information Age” wrote: We are connected to each other electronically through communications systems that we don’t understand and to people we don’t know personally, and maybe don’t know that they are connected to us. Our lives bleed out through on-line personal accounts and everyone knows our foibles and sins. Our hard earned money is stolen from our bank accounts by somebody in a mid-eastern country, which we didn’t know existed. And all of this is accomplished using 1’s and 0’s in a nanosecond of time from thousands of miles away. I notice that the American Enterprise Institute (AEI) is held a conference titled “Road Ahead to Cybersecurity”. I don’t think that there is a “road ahead” for cyber security. There isn’t a road at all! The whole playing field has changed and there are no defined roads in or out. I firmly believe that we are stuck in a quagmire alongside that “road” to the playing field and it dead ended at the entry to a new age called “the Cyber Information Age”. What are the future threats?Sub-dermal chip implants. Restorative and enhancement technologies, biohackers, cyborgs, grinders and sub-dermal technology (chipping). Restorative technologies include devices used to help individuals medically. They include devices, that include a computer chip, used to restore the lives of individuals to normal or near normal. Restorative technologies include devices such as heart pace makers, insulin pumps and prosthetic devices. Enhancement devices are those which the individual implants into their bodies outside of the medically approved arena. Individuals can for just $39 buy a glass-encased embeddable chip that works with some Android smartphones. A full DIY cyborg kit, including a sterilized injector and gauze pads, runs about $100. Amal Graafstra, a cyborg who creates and sells biohacking devices, said, “Some people see the body as a spiritual vessel not to be tampered with. And some people understand their body is their own, treating it like a sport utility vehicle. I see [biohacking] as, I got fancy new fog lights on my SUV. “ Some of these enhancement devices are being designed to be used with computer games. The idea is to give the gamer a more realistic experience by using sub-dermal technology to provide pleasure and pain as the game is played. Mr. Jorgensen states that the gaming industry is “spending $300 million annually” to provide sub-dermal gaming chips, effectively turning gamers into cyborgs. If a gaming chip is implanted in an individual and it can impact that person emotionally or physiologically, then someone (biohackers) could access the chip and use it to control the individual. Mr. Jorgensen calls this phenomenon “chipping.” Mr. Jorgensen notes that the U.S. military used to use games to train our soldier but dropped the program. The reason was that games are all about the individual and not the team. The gamer games to win, regardless of the impact of those around him or her. How will this impact society?Jim Brandon in his column “Is there a microchip implant in your future?” wrote: Like any tech advancement, there are downsides. Concerns about the wrong people accessing personal information and tracking you via the chips have swirled since the FDA approved the first implantable microchip in 2004. Naam and Pang both cited potential abuses, from hacking into the infrastructure and stealing your identity to invading your privacy and knowing your driving habits. There are questions about how long a felon would have to use a tracking implant. And, an implant, which has to be small and not use battery power — might not be as secure as a heavily encrypted smartphone. Troy Dunn, who attempts to locate missing persons on his TNT show “APB with Troy Dunn,” said a chip implant would make his job easier, but he is strongly against the practice for most people. “I only support GPS chip monitoring for convicted felons while in prison and on parole; for sex offenders forever; and for children if parents opt in,” he says. “I am adamantly against the chipping of anyone else.” Using chip implants to locate abducted children could actually have the opposite effect. Pang says a microchip would make a missing person easier to rescue, but “Kidnappers want ransoms, not dead bodies. The most dangerous time for victims is during rescue attempts or when the kidnappers think the police are closing in.” And beyond the obvious privacy issues, there’s something strange about injecting a chip in your body, Lipoff says. Yet pacemakers and other embedded devices are commonly used today. “People might find it a bit unsavory, but if it is not used to track you, and apart from the privacy issues, there are many interesting applications,” he says. What happens if you, your child or grandchild decide to implant a chip in their body. What would you say, think, do? RELATED VIDEO: Video courtesy of Grinders: David Forbes and his column “Tomorrow’s Cyberpunks are here Today” [NSFW] ___________________________ |
Why the “Glitch” Is a Reason to Worry
by KEVIN D. FREEMAN on JULY 11, 2015 Last week the NYSE was shut down for trading for nearly four hours. The official explanation was a technical glitch. Of course, it was the worst glitch in nearly two centuries of trading activity. The last glitch worth mentioning was in 2001 when the exchange was down less than 90 minutes. Almost immediately the government and the exchange ruled out any form of cyber attack. What makes the NYSE incident more concerning is that it occurred the same day as a United Airlines glitch that grounded flights across the country. In addition, The Wall Street Journal also experienced an outage. There were explanations for all three that seem reasonable. But three at once? And then two days later, TD Ameritrade has a serious outage as well? All of this happened in a week during which the Chinese market showed evidence of a crash and the Chinese government vowed to stop malicious short selling. And, the NYSE glitch happened after Anonymous posted a mysterious tweet. Yet, even before the problems were resolved, we were assured that there was no hacking–there was no cyber attack. Others weren’t so certain. Breitbart reported a concern that the combination of glitches might be the start of a Cyber War. Others noted the long odds that a confluence of glitches might occur as they did. One cyber expert was quoted in WorldNetDaily: “I have been in this business way too long to believe in coincidences. I hear such a thing may happen, but I have never seen one,” he told WND…He explained that the “mission-critical systems” of major corporations and governments have communications, power, processing and storage redundancies built in that allow for a seamless “hot swap-over” to keep them running if one part of the system is incapacitated. “The odds of failure of three systems like this, simultaneously, are in the trillions to one,” he said of the NYSE, United Airlines and the Wall Street Journal. Then there is the fact that the software update was supposed to occur in a test environment and should not have had any negative impact when implemented: “Asked to respond to the official explanation, the cyber intelligence analyst told WND that if true, the NYSE violated Sarbanes-Oxley Act regulations requiring that ‘mission-critical applications’ be rolled out on a test network before being put on the production server.” Of course, there was an explanation for that as well. According to the official report, the test network functioned properly but in production orders slowed sharply. There are two possibilities. One is that there was Cyber Warfare activity this week but it either wasn’t recognized or was covered up. The other is that our systems simply are that vulnerable even without a hacking attack. Neither inspires confidence. Remember the official explanations for the May 6, 2010 Flash Crash (when the Dow dropped almost 10% in a few minutes)? First, we were told it was a “fat finger.” Then, it had something to do with Waddell and Reed, a Kansas City brokerage firm. Most recently, we have been told that the problem was caused by a London-based trader with $40 million. Some believe there has been a coverup. Others believe it was a cyber warfare test. Here’s the real problem. The Chinese have developed weapons that could crash our stock market. The Russians claim this capability as well. In fact, Russia hacked NASDAQ not long ago. And, the former head of the NSA and the military’s Cyber Command has admitted publicly that nation states have the capability of taking down our economy via cyber and other means. Worse still, the current NSA head has admitted that China and others have the ability to take down our entire electric grid. The cost would be huge according to a new Lloyd’s of London report: Let’s imagine an “improbable, but not impossible” cyberassault on the U.S. power grid. A shadowy group of skilled and malicious actors spend years implanting a piece of malware, dubbed the “Erebos” trojan, in the control systems of power plants across the Northeastern United States. It determines which of them haven’t yet installed hardware to prevent a type of cyber-enabled assault that’s been known to the industry for nearly a decade. Then, on one fateful day, they activate the malware, causing up to 50 power-plant turbines to overload and burn out, blacking out the power grid between Chicago, New York City and Washington, D.C., and leaving 93 million people across 15 states without electricity. While some power is restored within 24 hours, it takes weeks for the rest — and the cost to the U.S. economy adds up to $243 billion, or in a worst-case scenario, nearly $1 trillion. Of course, we have been warning about the Cyber-Economic war threat for years. When the “glitches” began this week, I was contacted by media and others acknowledging that the risks seemed all too real. You can see portions of my appearance on the Dana Show here: We may never know whether or not there was hacking behind this week’s unusual glitches. But, we cannot ignore the risk any longer. ___________________________ ISIS Declares Cyber-Economic War
by KEVIN D. FREEMAN on MAY 13, 2015 We’ve shared before the long-term goal of establishing an Islamic State that dates back to at least ten years ago. The timeline released to a Jordanian journalist is frightening to the degree that radical jihadists like al Qaeda and ISIS seem to be tracking with their plan. They mention electronic attacks (cyber) to commence in the 2010-2013 period, just before the “declaration of the state.” Just recently, we had an ISIS declaration of cyber warfare as described in a very recent CNN report. Here is a Transcript via Gateway Pundit: We were able until this moment to hack the website of the American leadership. And website of the Australian airport and many other websites. Despite spending billions to secure your electronic websites. Your security information is in our hands. You do not have the power to fight the Islamic State… By the help of Allah we will show our power to the West. Soon we will publish your plans that seek to fight Islam… We observe all the movements you are doing from your devices… Soon you will see how we control your electronic world… Today the electronic fields witness on our victory… Soon you won’t have any control over the internet. This is how PJ Media interpreted the story: ISIS Hackers Release New Video Threatening Cyberattacks, ‘Electronic War’ on U.S., EuropeAfter promising on social media that a “message to America” would be forthcoming at 2:00 EST Monday, a group of ISIS-affiliated hackers released a video at 2:10 Central in Arabic: “To the servants of the cross from the Earth to the digital world.” A group calling itself the “Islamic State’s Defenders in the Internet” threatened to execute cyberattacks in the United States and Europe and claimed to have the ability to monitor electronic devices and communications of Americans and Europeans. In the video,a hooded and faceless figure is seen hunched over a laptop looking very much like the symbol of the hacker collective known as Anonymous. With Islamic chanting in the background, the figure reads a prepared script in Arabic with English subtitles. According to the video, “the electronic war has not yet begun.” As we have warned, the new battle field is cyber-economic. Only now, it seems, is the Defense establishment beginning to recognize the seriousness of this threat. If you haven’t developed a personal plan, you should get a copy of Game Plan; How to Protect Yourself from the Coming Cyber-Economic Attack. Share this: __________________________ |
Air-Gapped Computers Proven To Be Penetrable
Aug 1, 2015 Researchers from the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information from infected “air-gapped” computers. This discovery by the center’s reasearchers is a breakthrough, since these are networks that supposedly function in a network completely separate from the open network, and are thus supposed to be impenetrable to external elements. The team of researchers, Led by BGU Ph.D. student Mordechai Guri, has discovered how to turn an air-gapped computer into a cellular antenna through which a cellular phone user can steal information which should be inaccessible to them. Guri says that many companies don’t allow their employees to use cellular phone near the air-gapped system, or at least demand them to restrict themselves to the applications allowed, such as cameras with no cameras, video or WiFi connection. The research showed that classified computer are exposed to penetrations only when cellular phones are nearby, up to a radius of 30 meters, and so the general recommendation for companies that want to keep their information secret is to ban use of cellular phones near the network altogether. Though the research is considered a breakthrough, it seems that security bodies have realized in advance the danger they face from cellular devices. It’s well-known that the security system, at least the Israeli one but probably in other countries as well, demands participants in classified meetings with high-ranked intelligence officials to leave their cellular devices outside the room, separated from the batteries. It’s now been academically confirmed that there is indeed a reason for this fear of security leaks. Subscribe to our newsletter. - See more at: ___________________________ Cyber Warfare is Here. Are We Prepared? Or Are Our Heads in the Sand?
by KEVIN D. FREEMAN on JANUARY 19, 2015 First, let’s start with the reality that a Cyber-Economic War is already underway. If the Sony hack by North Korea wasn’t sufficient proof, then the hacking of Centcom’s social media should demonstrate the purpose. Enemies of the United States have ill intentions and verifiable capabilities. No, this is not simple cyber-vandalism as the President has suggested. Neither is it as simple as cyber-graffiti despite media efforts to portray it as such. It is nascent 21st Century Economic Warfare and unfortunately, at least so far, we have done little to prepare for it. And it will get worse. What made the Sony hack so important? The fact that it was state-sponsored, for starters. More importantly, it showed the power of a simple hack to change global dynamics even by a less-advanced power like North Korea. In fact, estimates of North Korea’s $40 billion GDP is not even double the $22 billion market cap of Sony. Yet, anonymous hackers were able to humble the media giant. They might have had inside help. But so what? That doesn’t diminish the problem. We know that insiders such as Edward Snowden can represent huge vulnerability. Some have questioned how the government was certain that North Korea was behind the Sony attack. The answer is that the NSA was essentially watching. Which is sort of creepy and reassuring all at once. What is scary, however, is that while they saw and could trace the activity, they weren’t sure what exactly was happening and thus not in a position to stop the attack. From a New York Times article (posted at CNBC): The N.S.A.’s success in getting into North Korea’s systems in recent years should have allowed the agency to see the first “spear phishing” attacks on Sony — the use of emails that put malicious code into a computer system if an unknowing user clicks on a link — when the attacks began in early September, according to two American officials. But those attacks did not look unusual. Only in retrospect did investigators determine that the North had stolen the “credentials” of a Sony systems administrator, which allowed the hackers to roam freely inside Sony’s systems. In recent weeks, investigators have concluded that the hackers spent more than two months, from mid-September to mid-November, mapping Sony’s computer systems, identifying critical files and planning how to destroy computers and servers. “They were incredibly careful, and patient,” said one person briefed on the investigation. But he added that even with their view into the North’s activities, American intelligence agencies “couldn’t really understand the severity” of the destruction that was coming when the attacks began Nov. 24. What happens if a similar effort were made against a systemic company (like JP Morgan or NASDAQ)? What happens if the attacks are made by Russia or China? And, how does a company respond to a state-sponsored attack? Would we go to war over the hacking of a company? While that question seems odd, wouldn’t we do anything required to protect American interests from a physical attack like blowing up a commercial building? The Centcom hack is equally vexing. Yes, hacking the social media websites is not the same as hacking Centcom itself. But that misses the point. Facebook and Twitter are about P/R and ISIS thrives on it. This became a huge recruiting poster for ISIS, funded by the United States government. It appeared as cyber sophistication for ISIS and an embarrassment for us. And, it showed that even the best of the military can be vulnerable. When you factor in the possibility of insiders loyal to the opposition, the impact of cyber exposure becomes very real. We cannot afford to ignore the fact that our national defenses are cyber targets. Don’t forget that Iran successfully hacked elements of the Marine Corps and Navy databases. Yet, despite the troubling nature of these high-profile attacks, they are really just the tip of a very large iceberg. Yes, there are the commercial hacks against Target and others to steal credit cards. But that is more criminal than warfare. And, there are the hacks to steal technology. That’s more cyber espionage. And, there are the hacks to shut down websites. Maybe that could be a sophisticated prank. But all of these point the same direction. The stakes are increases and so is the frequency. For example, there were 19,000 attacks on French websites over the weekend described as jihadist retaliation. Much of our critical infrastructure was hacked by Iran for two years and we learned about it AFTER the fact. If that’s not cyber warfare, then nothing really is. One of our challenges is that we have been facing Cyberattacks without a playbook according to The New York Times: “Until now, we’ve been pretty ad hoc in figuring out what’s an annoyance and what’s an attack,” James Lewis, a cyberexpert at the Center for Strategic and International Studies, said last week. “If there’s a lesson from this, it’s that we’re long overdue” for a national discussion about how to respond to cyberattacks — and how to use America’s own growing, if unacknowledged, arsenal of digital weaponry. This is despite the fact that all sectors of the government have openly warned of a coming “cyber-Pearl Harbor.” Democrat Leon Panetta warned us as Defense Secretary in 2012. We have been warned again this year by Republican Congressman Michael McCaul, chairman of the House Committee on Homeland Security. Nearly every CIA head, Homeland Security Secretary, and NSA chief has echoed these concerns. Former UN Ambassador John Bolton wrote an Op-Ed with some powerful truths: “When foreign states are involved, however, we are edging into the next-higher threat level, namely espionage, hostile clandestine actions and “influence” operations. Intelligence agencies routinely engage both in gathering information and conducting covert actions that can involve significant damage to their targets. We are long past Secretary of State Henry Stimson’s disdainful observation that gentlemen do not read each other’s mail, especially in cyberspace. The most threatening, most dangerous categories of attacks amount to acts of war or terrorism, at various levels of intensity. This end of the spectrum is difficult for many to grasp because cyberwarfare does not necessarily involve visible physical damage, at least initially. But warfare or terrorism it is nonetheless. Thus, North Korea’s attack on Sony should be seen, at a minimum, as state terrorism, verging on an act of war, not mere vandalism, as Obama opined. Moreover, for countries like North Korea or China, cyberwarfare is quintessentially asymmetric warfare; such states cannot realistically confront America in the traditional spectrum of military conflict. That is also why the likes of North Korea and Iran have nuclear-weapons programs. And it is gravely important that we grasp that cyberattacks and our responses cannot necessarily be confined to cyberspace but must be evaluated in broader politico-military terms. America’s posture, therefore, cannot simply be defensive. We need far more muscular offensive cyber capabilities, since in cyberspace, as elsewhere, offense and defense are two sides of the same coin. Enhanced U.S. offensive power will help build the psychology of deterrence to prevent or dissuade future cyberattacks. Thus, our response to Pyongyang should not be, as Obama asserted, merely “proportional.” It should be disproportional and not confined to cyberspace. The newly announced sanctions against Pyongyang might be a first step but are not nearly enough. We need both more public debate about cyberspace and far greater awareness of the foreign and domestic threats our citizens, businesses and governments now face. We are behind (although not hopelessly so). But we cannot delay any longer. We have precious few laurels to rest on.” One problem is that Cyber War is intricately connected to Economic Warfare and both are escalating. Sanctions on Russia may directly lead to cyber retaliation and this could spiral into all out war. The NSA understands this but that doesn’t make us safe. Instead, it means we have entered a digital arms race according to Germany’s SPIEGEL ONLINE: SPIEGEL ONLINE 01/17/2015 05:07 PM The Digital Arms Race: NSA Preps America for Future BattleBy Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt and Michael Sontheimer The NSA’s mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars — a struggle for control of the Internet that is already well underway…. According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons — atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, “World War III is a guerrilla information war with no division between military and civilian participation.” That’s precisely the reality that spies are preparing for today. The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It’s no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country’s leading data spy, Admiral Michael Rogers, is also its chief cyber warrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks. [To CONTINUE READING at SPIEGEL…] The unfortunate thing is that no matter how sophisticated the NSA may be, the reality of cyber-economic warfare is that it is asymmetric. This was explained by James Rickards in The Daily Reckoning: How Financial Warfare Could Bring America to Its Kneesby James Rickards, December 1, 2014 Financial warfare is coming to the fore. It’s something that’s been talked about for some years, but now it’s actually being played out and practiced. Since 2012 the United States has been in a financial war with Iran. It’s not a shooting war, we’re not invading Iran, but because of their nuclear ambitions, the U.S. has tried to isolate Iran. We kicked them out of the dollar payment system so Iran could not transact in dollars. They said, well who cares, we’ll just transact in Euros or Yen or other currencies. So, then the United States got together with our allies and kicked Iran out of the international payment system, so suddenly they were at a point where they could ship oil, but they couldn’t get paid, at least not get paid in any currency that they would actually want. So, they started doing workarounds, barter deals, they put hard currency in Chinese and Russian banks and let those Chinese and Russian banks front for them to the international payment system. So the money was moving, but it looked like it was coming from Russia, and not from Iran, and Russia never disclosed who is the real party in interest. There was a run on the bank and Iran’s people wanted to get their local currency out, convert to dollars on the Black Market to preserve the value against what was collapsing in their own economy. They had to raise interest rates, and it caused inflation in Iran. It was very, very disruptive and destructive to the Iranian economy. It was almost to the point that if we had pursued it longer, we might have got regime change in Iran without firing a shot. But last December, the President relieved some of those sanctions and freed up tens of billions of dollars for use by the Iranians, so we kind of let them off the mat. There’s another financial war brewing right now, which is with Russia around Crimea. Russia of course invaded Crimea. No one – left, right or center thinks the U.S. should use military force in Crimea. We’re not sending the 82nd Airborne into Sevastopol anytime soon, but the U.S. doesn’t want to be seen to be doing nothing, and so we’re engaging in economic sanctions, which is a form of financial warfare. There’s a big difference, however, between confronting Russia and confronting Iran. Russia has a much greater ability to strike back — and just to show how this could escalate, so we put sanctions on, you know, some mid level bureaucrats, who cares, that’s no big deal. But recently, we put sanctions on Igor Sechin, who is one of the most powerful men in Russia, close crony of Putin’s, former KGB. Russia might decide to escalate. What could they do? They could freeze U.S. assets in Russia, they could dump U.S. treasury bills, drive up U.S. interest rates, sink our housing market and our stock market, which are sort of propped up by low rates and ultimately, they could unleash their hackers and shut down the New York Stock Exchange, which they’re completely capable of doing. And people say well, wait a second, don’t we have hackers? Can’t we close down the Moscow Stock Exchange and I say, of course we can, but who wins? The Moscow Stock Exchange is practically irrelevant to global capital markets, but the New York Stock Exchange is the beating heart, so we shut down each other’s stock exchanges, the Russians win. So, these are the kind of things that could come out of the blue. Most investors aren’t thinking about it at all. Why should they? They’re not expert necessarily in international politics or financial warfare, but if we’re going to have wars that are not shooting wars, that are cyber and financial wars, but capitals markets are the collateral damage that investors can suffer even if they don’t see it coming. I appeared with Jim Rickards on the Glenn Beck program a couple of weeks ago (watch here, subscription required) and Mr. Rickards reiterated this concern. Basically, because America is more dependent on the Internet and our financial system than our primary adversaries, we are more at risk. That is also something that has been shared by the former head of the NSA, General Alexander, who said a foreign power could crash our financial system. His successor, Admiral Rogers, admitted that the Chinese and others could take down our power grid. Either could potentially end America as we know it. While the media seems to be avoiding this reality and Americans prefer to keep their heads in the sand, we have noticed that the London- and New York-based financial industries are beginning to work with the FBI/NSA and MI5/GCHQ to conduct joint cyber war games according to the January 16 issue of the UK Independent: The first of a series of joint UK-US “war games” will simulate online attacks on the City of London and Wall Street in moves to assess the quality of the large financial institutions’ defences against malicious hacking designed to paralyse their operations. It will involve UK and US intelligence agencies as well as organisations such as the Bank of England and several large commercial banks. The “war game” will be followed by further exercises to test critical national infrastructure in the two countries, such as the computer systems controlling power supplies and the road and rail networks. Britain and the US are also to establish a joint “cyber cell” on each side of the Atlantic where intelligence agents will work together to share information about threats and respond to any attempted attack. The first time the UK has established such an operation overseas, it will bring together MI5 and GCHQ with their counterparts in the National Security Agency and the FBI. This is a positive step, but it does not yet connote a true war footing and does little to directly protect your family. In traditional warfare, there is a physical battle space that must be prepared. In cyber-economic warfare, the battle space involves private industry, government, and the general public. We have a long way to go to prepare for what is undoubtedly coming. And, since the Internet, infrastructure, and financial system are connected to virtually every home in America, this means that a cyber-economic war can touch you where you live. This requires personal preparation for your finances, family’s safety, and investments. Don’t wait, start preparing now. This includes developing a personal cyber-security plan, keeping paper copies of transactions, reviewing your investments, keeping some extra cash on hand in case ATMs go down, storing at least some extra food and water, and developing a communication plan in case the cellular networks go down even temporarily. I covered some of these thoughts (especially in regard to investing) in Game Plan; How to Protect Yourself from the Coming Cyber-Economic Attack. _______________________________________________________________ |