INTRODUCTION
Ukraine’s power grid was hacked last December presumably by Russia, showing physical infrastructure affected by cyberattacks
Question still loom over the role of cyber attacks on large companies and political bodies (RNC/DNC hacks, WikiLeaks) on the 2016 American election
As such, intelligence and homeland security forces need to turn a stronger eye toward cyber-terror and cybersecurity
I. CYBERTERRORISM
Cyberterrorism increasingly the primary method of attack from foreign bodies and terrorist forces
Three levels of cyberterror: simple-unstructured, advanced-structured, complex-coordinated
Attacks occur through Internet communication methods (forums, Skype, VoIP, IM) and DDoS attacks
II. CURRENT EFFECTS OF CYBERSECURITY
American intelligence communities and private organizations have been woefully slow in adopting appropriate cybersecurity
Sony leaks of 2014 first evidence of foreign hacks due to political reasons (impending release of The Interview)
Top threats include phishing, use of stolen credentials to access sensitive data, data exfiltration malware, as well as back doors and physical breaches, etc.
III. RECOMMENDATIONS
DHS should become lead agency for strengthening national cybersecurity
Backup National Cybersecurity Protection System should be created to lower cost of other successful cyber attacks
FBI should take the lead for cyber-attack investigation (Secret Service has jurisdiction on attacks against those they protect)
The NSA and DOD should maintain their mission and expand their capabilities
CONCLUSION
Organizations such as DHS must take further steps to understand existing vulnerabilities
Must take measures to safeguard vital operations
Appropriate defenses can help reduce instances of cyber-attacks and possible foreign interference in our democracy
Continuous research and vigilance necessary for intelligence and security agencies to remain up to date on cyber issues
References
Shaffer, D. G. (2016). Cybersecurity “lanes in the road" for the Department of Homeland
Security (Doctoral dissertation, Monterey, California: Naval Postgraduate School).
Mehan, J. (2014). Cyberwar, Cyberterror, Cybercrime and Cyberactivism: an in-depth guide to
the role of standards in the cybersecurity environment. IT Governance Publishing.
Ogun, M.N. (ed.). (2015). Terrorist use of cyberspace and cyber terrorism: new challenges and
responses. IOS Press.
Wagner, D. (2016). Infrastructure under attack. Risk Management, 63(8), 28.