Upload
josh-headings
View
215
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Information Age Warfare today - A real threat that requires real solutions.
Citation preview
Cyberspace Threats Affecting Business and Government in the Information Age 1
CYBERSPACE THREATS AFFECTING BUSINESS AND GOVERNMENT IN THE
INFORMATION AGE
Cyberspace Threats Affecting Business and Government in the Information Age
Prepared by:
Sunita Kaur
Joshua Headings
David Clark
IT486: Critical Issues in Information Technology
Central Washington University
Prepared for:
Terry Linkletter
June 3, 2011
Cyberspace Threats Affecting Business and Government in the Information Age 2
Index
Executive Summary ....................................................................................................... 3
Introduction .................................................................................................................... 3
Espionage ....................................................................................................................... 4
Cyber warfare ................................................................................................................. 7
Cyber security ................................................................................................................. 13
Conclusions .................................................................................................................... 20
References ...................................................................................................................... 21
Figures
Figure 1: How Prepared are Companies? ....................................................................... 15
Cyberspace Threats Affecting Business and Government in the Information Age 3
Cyberspace Threats Affecting Business and Government in the Information Age
Executive Summary
Nations are quickly becoming aware of the many dangers inherent in the information age
that threaten not only the security of governments, but also the well being of citizens and of
economies. Crippling cyber attacks, industrial espionage, and many other risks taken by
venturing into cyberspace have had a significant impact on the geopolitical landscape, prompting
world powers and developing countries alike to begin ramping up a massive cyber arms race in
the bid to seek dominance over, or safe harbor from, mankind’s artificially created information
domain. People and businesses have been caught in the middle of this ongoing struggle, which
has greatly steepened the learning curve that must be overcome to stay informed and shield
against the potentially catastrophic consequences of this technological reality.
Introduction
Just as humanity woke up in the information age to the reality that nations are no longer
protected from foreign enemies and competitors around the world by oceans and other
geographic barriers, it has been onset by a future that has brought with it new challenges
threatening modern societies. In braving this new technological frontier, businesses and
governments have placed so much trust and reliance on computers to store and process
information, and have gone so far in computerizing and connecting systems supporting those
societies, that this has created a vast and all-encompassing cyberspace domain from which those
threats are now more real and more menacing than ever before. (Adams, 250)
Cyberspace Threats Affecting Business and Government in the Information Age 4
Today it is estimated 98% of all local, state and federal U.S. government communications
take place over civilian-owned-and-operated computer networks, against which countless daily
cyber attacks have accounted for the loss of over $6 million each day from the nation’s economy,
on top of many more millions spent responding to and repairing damage from these attacks (an
excess of $100 million was spent by the Pentagon alone during a six-month period in 2009 for
this purpose). (Size) Computer hackers continuously probe the security of computer networks
owned by the nation’s largest corporations, as well as top government institutions including the
White House, the Department of Homeland Security, U.S. Secret Services, the Department of
Defense, and NASA. (Jensen, 2010) The perpetrators of these attacks cannot often be identified,
and may act independently or as part of an organized criminal or government effort. Motives for
such activity are often financial, political or strategic. When governments exhibit this behavior
over cyberspace against enemy nations or foreign businesses, all of these all of these motivations
fall under the umbrella of cyber warfare – “actions by a nation-state to penetrate another nation’s
computers or networks for the purposes of causing damage or disruption”. (Clarke, 5) This
concept has quickly evolved to include not only actions targeting the military and other public
sectors, but also the private and consumer sectors.
Espionage
Success in armed conflicts is often measured by the effectiveness of militaries to gain and
leverage new technologies for a strategic advantage. Indeed, nations have been practicing
economic espionage since before the invention of the computer to gain military and economic
advantages by illegally accessing and analyzing companies’ trade secrets and other private
information. Before people learned how to do this with computers, companies and governments
Cyberspace Threats Affecting Business and Government in the Information Age 5
relied largely on spies embedded within targeted organizations to gather information that could
not otherwise be purchased or acquired. This includes knowledge that would make it easier to
compete with, defend against, or to circumvent an enemy’s military and economic strength. This
often relates to weapons systems and other technologies nations expend considerable resources
to develop.
While there is often very little risk of identification and punishment for individuals,
groups or institutions committing these acts, the damage done to those that fail to adequately
secure information from such attacks can be significant. The Chinese government, for example,
has made significant strides within the last decade to equip its armed forces with the world’s
most advanced military systems. It has been accused of stealing much of its newfound wealth of
technology from defense firms working for the U.S. government, which points to a massive
decentralized network of spies “…scouring the globe for the Chinese government, vacuuming up
every shred of technology information or hardware they can get their hands on.” One such spy
was found guilty in 2005 of exporting U.S. night vision goggles, and engines from Black Hawk
helicopters, to China. Other such spies have stolen low-noise amplifier microchips used in air-to-
ground missiles, as well as navigation and radar systems, engines from F-16 fighter jets, and
many other sensitive technologies. (Cooper)
Successful breaches of U.S. networks have resulted in the theft of countless files
containing sensitive data vital to the nation’s security, including surveillance information,
operational plans, and weapons blueprints. (Lynn) One widely reported theft occurred in 2009,
when it was feared someone had gained access to several terabytes of data detailing the highly
guarded secrets of the U.S. government’s most expensive known weapons program – the $382
billion F-35 Joint Strike Fighter project – with similar breaches compromising the security of the
Cyberspace Threats Affecting Business and Government in the Information Age 6
Air Force’s air-traffic-control system. (Gorman) The targeted defense firm, Lockheed Martin,
later denied the report, pointing out the effectiveness of its security system to detect and prevent
the constant barrage of attempted intrusions that company and many like it have been faced with.
The high level of media attention given to this incident highlights the ever-present threat
of an event that would allow a competing company or foreign enemy to negate the strategic and
economic benefits yielded from the investment of not only the U.S. but many other allied nations
pooling their scientific and financial resources.
If a government had successfully stolen the F-35 Joint Strike Fighter plans, it could not
only use the information to determine how best to counter and defend against this technology,
but it could also reverse-engineer it to produce, and even sell, knockoffs of F-35 fighter jets. An
example of this was seen only last year in China, which ignored trade restrictions to purchase a
Russian Su-33 fighter jet from the Ukraine, and is now remanufacturing it for military use. Not
only that, but it is also selling copies of the plane on the international market, at a price so low
the Russian defense firm cannot compete because it is burdened with the need to recoup the high
cost it paid to develop the technology. (Pravda) This theft and infringement of the company’s
designs was repeated four years prior, when after delivering half of an ordered allotment of Su-
27CK fighter planes to China, the Chinese Communist Party (CPC) declined to sign an
agreement with Russia for the remaining shipments, revealing that it had successfully reverse-
engineered the technology (despite legal restrictions) after analyzing the planes it had already
received from Russia. China has been producing identical copies of those planes as well, at
relatively little expense.
The benefits of pursuing such espionage capabilities over cyberspace are too big to be
ignored, which is why it should not come as a big surprise that the U.S. and some of its biggest
Cyberspace Threats Affecting Business and Government in the Information Age 7
allies join Russia, China, Iran, North Korea, and others on the list of the most aggressive users of
advanced military and economic intelligence gathering operations on the globe. (Lynch) As one
CEO of a cyber risk consulting firm put it, “…everybody is busy spying on everybody else.” In
the information age, the methods employed to circumvent the privacy of governments and
companies have added many layers of complexity to the geopolitical landscape. (Acohido)
Cyber warfare
The Pentagon has formally recognized cyberspace as a new and critically important domain
of war, as influential on the outcome of armed conflict as air, sea, land and space. (Lynn) This
assertion has been proven on the battlefield, and governments now clamor with the same vigor to
procure not only the best tanks, planes and other kinetic warfare technology, but also the
brightest minds and the newest cyber weapons and defenses to help seek dominance over their
enemies within this new domain. China is the latest nation to confirm the existence of its own
cyberwar command, which is believed to have existed for at least two years. The elite 30-
member cyber security force the CPC named the “Blue Army” was revealed in May of this year,
with the stated mission of thwarting cyber attacks made against China. (NewsCore) The
announcement followed a report released earlier in the year outlining numerous discovered
vulnerabilities in China’s infrastructure to an assertive cyber attack, including its dams, gas and
oil pipelines, factories, and other computerized systems relying on a relatively domestically
software industry. (Waterman)
Russia has displayed its cyber military might numerous times in recent years, most
notably against Estonia in 2007, and again during a brief conflict with Georgia in 2008. In both
instances, the Russian government allegedly directed the actions of botnets containing millions
Cyberspace Threats Affecting Business and Government in the Information Age 8
of infected computers to flood these nations’ vital computer systems with overloading volumes
of Web traffic in sophisticated and prolonged denial of services (DoS) attacks. (Clarke, 13)
These cyber attacks affected telephone services, credit-card verification services, and the Internet
directory itself, hampering peoples’ ability to communicate and to pay for goods and services. In
a unique way, this type of attack was used to directly impact the governments, companies, and
private citizens of those countries. Society was largely put on hold for those small nations during
the course of these online assaults.
It has been speculated that the Russian government (which denied it role in these events,
instead characterizing them as a “populist response” beyond the control of the Kremlin) (Clarke,
20) was exerting significant constraint, likely hiding the true weight of its cyber warfare
capabilities for a major conflict against the U.N. or the United States (Clark ,21) Russia, along
with China, have also been accused of attempting to map out key U.S. systems (electric grids,
nuclear plants, financial networks, water and sewer, etc.) and implanting code that could
potentially be used to control and disable those systems. (Size)
Israel has also had great success in applying its cyber warfare know-how to the
battlefield. In 2007, an Israeli Air Force strike force of F-16 Falcons and F-15 Eagles
successfully entered Syrian airspace long enough to pepper a clandestine nuclear facility with
bombs, wiping out the work being done in secret by the Syrian government in conjunction with
North Korea. There are several theories as to how Israel could have pulled this off. One such
method holds that the jets were not detected because of a single unmanned aerial vehicle (UAV)
deployed over Syrian skies, with the job of capturing and altering radar signals before sending
those signals back to display on the network’s computer screens as images of empty skies.
(Clarke, 5) It has also been theorized an Israeli agent within a Russian or Syrian facility could
Cyberspace Threats Affecting Business and Government in the Information Age 9
have hidden malicious code into the air defense program that would instruct the system to fail in
the event it received and processed a particular electronic signal provided by an Israeli UAV
passing overhead. Such a signal could have also been provided by an Israeli agent splicing into a
fiber-optic cable somewhere in Syria that was connected to the defense network. (Clarke, 8)
Whichever method was used, it likely cast doubts on the reputation of the Russian defense firm
that designed and manufactured Syria’s air defense systems.
Britain announced in May of this year that it was developing its own offensive cyber
warfare capabilities that it could use to respond to threats against its national security. The
country’s Armed Forces minister, Nick Harvey, said that a successful attack on Britain’s
computer networks could be “catastrophic”, and that the military’s new cyber weapons would
fall partially under the same rules governing its special forces. (Bloxham)
The U.S. is no stranger to cyber warfare, and has been applying its skill in this new
domain long before the nation embarked on its mission several years ago to develop a United
States Cyber Command capable of conducting full spectrum military cyberspace operations. At
the start of the second Iraq War, U.S. forces compromised the Iraqi military’s defense network,
(Clarke, 9) to deliver E-mails addressed to thousands of enemy military personnel with
instructions to line up all tanks and other armored vehicles, and for soldiers to abandon all
military installations. Many complied with the U.S. orders. It was recognized at the time that the
U.S. possessed the capability to subvert the networks of banks in Iraq and elsewhere to destroy
its leader’s financial assets, though the Bush Administration chose not to take this course of
action because of fears that this could not only violate international law, but also set a dangerous
precedent. One wrong move and American cyber warfare experts could in such a scenario
Cyberspace Threats Affecting Business and Government in the Information Age 10
unintentionally wipe out entire financial institutions, (Clarke, 10) resulting in unpredictable
consequences.
Even more harmful to societies in the information age could be the strategies being
developed to disrupt the military capabilities made possible by cyber warfare technology. This
includes nations like the U.S., Russia, China and now India developing weapons capable of
destroying satellites stationed in orbit, which governments and commerce have become highly
dependent on for communication, navigation, surveillance, and a multitude of other essential
applications. Not least of these is the global positioning system (GPS), which modern militaries
use to guide smart bombs, mortars, and missiles to their targets with incredible accuracy. It is
also used to track and remotely operate UAV’s and other unmanned weapon systems from great
distances, as well as aid in coordinating fleet and troop movements, and conducting advanced
reconnaissance. Likewise, GPS and other satellite technology have countless business
applications that organizations rely on. Some of these include tracking and coordinating
commercial flights and ships, synchronizing electrical grids, and enabling high-speed Internet,
television and radio broadcasts, and cell phone transmissions.
In the name of national defense, earlier this year the Egyptian government and others
caught up in widespread historic protests across the Middle East attempted to control and
dissolve those protests by cutting off all cell phone and Internet services in the country, which
provide communication and social network capabilities empowering citizens to assemble and
speak out against those governments. Because of the important role those same technologies play
in peoples’ daily lives, One Western think tank estimated this tactic resulted in the approximate
loss of $18 million to the Egyptian economy each day services were suspended. A second think
tanked based in Paris warned the long-term price to the economy could be far greater, as these
Cyberspace Threats Affecting Business and Government in the Information Age 11
events have likely made it more difficult to convince companies to do business within those
nations. (Associated Press) All of this has exasperated concerns about proposed U.S. legislation
that would give the government’s administration its own “kill switch” authority over Internet
services, with the stated intention of protecting vulnerable computer networks controlling
banking services, power grids, phone networks, and other key systems from a catastrophic attack
over cyberspace. (Waterman)
In what could also be described as a flexing of its own cyber warfare capabilities, a
telecommunications company in China successfully redirected or “hijacked” nearly 15 percent of
the world’s Internet traffic to servers within China for an 18-minute period in early 2010. A
congressional report concluded the achievement diverted traffic to and from .gov and .mil Web
sites in the U.S., as well as Web sites used by the U.S. Senate, the office of the Secretary of
Defense, the National Oceanic and Atmospheric Administration, all military services, major U.S.
firms, and many others. It was unknown how the traffic had been redirected, or for what purpose.
It was pointed out that such actions could “enable surveillance of specific users or sites.” (Miller)
That traffic could also be halted in its tracks, unable to reach its destination, which could create
the same scenario we’ve seen in Estonia and Georgia on a massive scale.
Faced with these threats, the Pentagon now says the U.S. military will reserve the right to
respond with traditional military force to instances of sabotage over cyberspace, which the U.S.
government will in the future consider to be acts of war from those nations that the attacks
originate from. This new policy operates under the assumption that cyber attacks powerful
enough to disable U.S. power grids and other key systems would require the resources only a
government could provide. (Gorman) The unclassified portion of a new doctrine outlining these
new rules of engagement reportedly does not address the difficulty in identifying the perpetrators
Cyberspace Threats Affecting Business and Government in the Information Age 12
of cyber attacks, nor does it take into account the ability of attackers to make a target believe the
intrusion originated from a different country altogether.
Cyber Security
Arguably the most extreme step to thwart future cyber attacks is being taken by Iran,
which has suffered significant setbacks to its nuclear program from numerous security breaches.
This includes the infamous “Stuxnet” computer worm reportedly crafted by the U.S. and Israel in
2009 to simultaneously destroy nearly a thousand uranium enriching centrifuges at Iranian
nuclear facilities. Other acts of sabotage against the program have been responsible for
destroying motors, vacuum pumps and other vulnerable equipment, some of which was believed
to have been infected with malicious code before it made its way to Iran from the international
market. (Markoff) The Iranian government is now pledging to unplug itself and other Muslim
countries from the rest of the world within the next two years by creating its own “national
Internet”. (Rhoads) The move to completely deny its citizens from public Internet access would
be unprecedented, and could have any number of political, social and economic consequences.
The task of governments and companies to protect against cyber attacks and other related
threats can appear daunting. Over 85% of those systems deemed critical to modern societies’
survival, including financial services, electrical grids, oil, gas, water, and other computerized
systems, are controlled by private corporations deemed incapable of adequately bracing this
infrastructure against a formidable cyber attack, due primarily to a lack of technical expertise. A
third of those companies included in a recent survey admitted to being unprepared for such an
attack. (HSNW) Companies claiming to being prepared for an attack are often discovered to be
exaggerating the strength and reliability of security systems intended to address such concerns.
Cyberspace Threats Affecting Business and Government in the Information Age 13
MacAfee recently reported millions of dollars in sensitive information was stolen from
over five major international oil and gas companies in a string of successful cyber raids. The
attackers’ bounty included bidding contracts, oil exploration data, proprietary processes, and
other financial documentation. (HSNW) The data breaches were reportedly blamed on a lack of
stringent security measures. Even in the case of reputable top-tier banking institutions, hackers
have been successful slipping in and out of systems thought to be tightly monitored, using
relatively primitive methods of intrusion. Private corporations are failing to take seriously the
growing threat to every computer-based transaction being made.
Figure 1: How Prepared are Companies?
To survive in the information age, companies must develop organized and comprehensive
security programs complete with sets of periodically reviewed policies and procedural guidelines
for employees and management to ensure adamant and collaborative attention is being paid to
protecting precious assets. This requires related training integrated into workers’ duties,
providing a deeper understanding of the objective of the program and it’s implications on the
company as whole. The policies and procedures for information security should include clear
Cyberspace Threats Affecting Business and Government in the Information Age 14
guidance for workers in regards to daily interaction with the computer network, including the
need for strict and enforceable login credentials such as unique identifiers and complex
passwords that should be altered every three months (Avitus Group).
In the U.S., for example, all government employees are instructed not to use private E-
mail accounts to discuss issues considered sensitive to national security. Agencies like the
Commodity Futures Trading Commission go the extra step of denying workers access to
personal E-mail account providers while they are on the job. Such restrictions may not
necessarily be included as a set rule employees must follow, however, and it is left up to each
agency to decide what access should be granted. The importance of these policies was
highlighted in a widely reported theft of hundreds of E-mail account passwords belonging to
Chinese journalists and activists, as well as senior U.S. government officials. These accounts are
managed by Google, which claims the goal of what it says is a perpetrator based in China was to
spy on the communications of those U.S. government officials. According to the Google official
who identified the security breach, the attacker had unfettered access to the E-mail accounts for a
number of months. (Quinn)
Another solution companies should consider is enforcing encryption policies on a local
level. These could range from network encryption, which is especially effective in wireless
networks, to actual data storage encryption on the physical level (Granville 106). With the
proliferation of individuals using person devices for corporate/government work, it has become
more difficult to regulate security and encryption policies. Data leakage from employees using
personal devices for work has become a very real issue that must be dealt with (Hayes 2008).
Adherence to encryption standards, as well following the recommendations outlined in the
following paragraphs, is one way that this issue can be greatly diminished.
Cyberspace Threats Affecting Business and Government in the Information Age 15
Use of digital signatures is yet another effective method for securing a company’s
information. This provides a way to ensure the integrity of information and also ensures genuine
identity of the parties involved. Along with taking advantage of encryption and digital signature
strategies, it's important for organizations to keep updated anti-virus solutions on company
devices, and on those devices that have access to company resources (Granville 106). Virus
detection and removal software is one of the most basic ways that information warfare can be
detected and stopped at a local level, before it can have any negative effects on its target.
Firewalls provide added protection that can significantly reduce the risk of contamination
from cyber attacks on a private network. These devices can be configured to ignore things such
as denial of service (DoS) or distributed denial of service (DDoS) attacks, and many can also
serve as intrusion detection systems (IDS) that can help alert ISP's to various types of attacks
(Granville 106). Intrusion Detection Systems can be configured to relay attack information
upstream to ISP's who can then use countermeasures to defend themselves.
Confidential information in both digital and paper form should be limited in access to
only those that need it. In addition, various security parameters should be put in place to deter
unauthorized access. This may be in the form of logins or physical locks. One such technique
employed by U.S. defense firms and many top firms involves a two-factor authentication
technology offered by RSA known as SecurID, intended to protect E-mail, Web servers, VPNs,
WLANs, and other network resources from being compromised in a cyber attack. (Kaplan) The
sophisticated algorithms utilized in this technology to generate a constant flow of continuously
changing security keys was cracked by computer hackers in March, and it has been speculated
widely since that the successful attack on RSA left agencies and businesses employing RSA’s
security services vulnerable to additional attacks carried out at a later date against Lockheed
Cyberspace Threats Affecting Business and Government in the Information Age 16
Martin, L-3 Communications and others that are suspected to involve the exploitation of the
compromised SecurID technology. These events serve as a grim reminder of just how vulnerable
computer networks are, and the importance of developing a depth of defenses to secure against
threats from cyberspace; to ensure all network traffic is being monitored and segmented, and that
numerous layers of precautionary software and procedures are put in place to prevent too much
reliance being placed on a single security strategy. (Hulme)
Software installation is another concern companies should address in their cyber security
plan. Both commercial as well as open-source software packages include various flaws or errors
that may provide an “open door” to hackers into the company’s system (Avitus Group). Software
installation should be conducted in a standardized, authorized manner. Administrators should be
ultimately responsible for software changes and installations. Personal usage should be included
in the security guidelines, as this also poses issues for companies. The plan must lay out the
particular usage expectations for employees, including the limitations placed on them. Lastly,
company equipment usage should be monitored to ensure security updates as well as compliance
with company policies (Avitus Group). Equipment extends to USB drives, portable computers as
well as PDA’s. Law enforcement may assist in the development of strong public sector solutions
to address national security issues. The public sector solutions combined with private solutions
may create a more feasible and solid defense against cyber attacks. Government assistance will
allow the company to work in partnership with law enforcements to investigate and rid their
networks of malicious activity.
Various programs have been created by the government that can assist public and private
sector companies in developing a more secure network. For example, the Department of
Homeland Security currently deploys an “intrusion-detection and security system” by the name
Cyberspace Threats Affecting Business and Government in the Information Age 17
of Einstein for the Comprehensive National Cybersecurity Initiative (CNCI) (Montalbano). It is
to be implemented in three phases, with Einstein 1 being a network traffic monitor, Einstein 2 an
intruder detector, and Einstein 3 a supplementary layer to the previous phase. This program is
currently being used by 12 federal agencies and provides over 250,000 indicators of malicious
activity per month (Montalbano). The program is expected to begin servicing all federal
government IT infrastructure by the end of this year. A supplementary program by the name of
Einstein 3 will serve as a detector on top of the Einstein 2’s technology (Montalbano). The
system picks up on common threats using deep packet inspection and redirects the traffic to the
departments’ cyber security system, which then decides what is considered a potential threat and
how to address that threat prior to any potential damage. The system is currently used with a
commercial internet service provider, indicating a private-public relationship. According to
analyst these types of cross platforms of relationships are to grow exponentially as the
government works to secure network infrastructure against cyber attacks. Any type of concrete
security defense is most likely going to based on government and private technologies to use the
best practices from both sectors (Montalbano).
As individual countries fight to conquer cyber crime and defend against its ghastly
effects, numerous problems remain unaddressed. Perhaps the biggest problem remains in the
legality of the cyber warfare and its correlating activities. Many countries are facing issues on
validating cyber attacks and its effects due to the lack of a legal order on the principle. There are
no legal parameters that outline cyber attacks or address the “breach of legal order” (Economist).
Various organizations have tried to assume the position of the legal authority such as NATO
however, none have prevailed. (Economist) The lack of a common legal code on an international
level has left many countries out in the dark. Such code should be a collaboration of the majority
Cyberspace Threats Affecting Business and Government in the Information Age 18
of the world’s nations, and should highlight the definition of a cyber crime in detail, as well as
offer ramifications of any breaches (Economist). Attackers should be held accountable for their
actions, and governments should be monitored by an international body to control cyber attacks.
Some efforts have been made on this front, including The Council of Europe, a guardian of many
international legal conventions. The council has worked to form a cyberspace treaty since 2001
addressing cyber crime (Economist). Many countries have failed to agree on the treaty’s
language, however, making it ineffective. Another effort is currently being undertaken by the
International Telecommunication Union, which hopes to create a global convention against cyber
crime. Some analyst predict a commonly agreed upon treaty will reach concurrence by 2012,
though reports vary considerably (Economist).
Conclusions
Cyberspace has made its way to the forefront of the international community’s focus as
an invisible and until recently silent struggle that has permeated our daily economic, political,
scientific, and cultural activities. (Watts) The threats to companies and governments in this new
domain are very real, and can affect small businesses and private citizens just as easily as it can
slip under the doors of the Pentagon and the White House. Everyone must do more to become
educated about and take appropriate precautions to protect their privacy, assets, and livelihoods
in this information age.
Cyberspace Threats Affecting Business and Government in the Information Age 19
References
Adams, A. A., & McCrindle, R. J. (2008). Pandora's box: social and professional issues of the
information age. Chichester: Wiley.
Acohido, B. (2010, January 15). China-Google quarrel highlights world of cyber espionage -
USATODAY.com. News, Travel, Weather, Entertainment, Sports, Technology, U.S. &
World - USATODAY.com. Retrieved May 23, 2011, from
http://content.usatoday.com/communities/technologylive/post/2010/01/chinese-
cyberspies-arent-the-only-ones-on-the-prowl/1
Associated Press. (2011, February 3). Internet cut-off could cost Egyptian economy |
OregonLive.com. Oregon Local News, Breaking News, Sports & Weather -
OregonLive.com. Retrieved May 26, 2011, from
http://www.oregonlive.com/business/index.ssf/2011/02/internet_cut-
off_could_cost_eg.html
Avitus Group. (2011). Timely Opportunity. BizActions | Email Newsletters | Business
Newsletters. Retrieved May 29, 2011, from
http://www.bizactions.com/showopp.cfm/spid/2296/art/1404/ind/US/
Bloxham, A. (2011, May 31). Cyber weapons 'now integral part of Britain's armoury' -
Telegraph. Telegraph.co.uk - Telegraph Online, Daily Telegraph and Sunday Telegraph -
Telegraph. Retrieved May 31, 2011, from
Cyberspace Threats Affecting Business and Government in the Information Age 20
http://www.telegraph.co.uk/news/newstopics/onthefrontline/8546921/Cyber-weapons-
now-integral-part-of-Britains-armoury.html
Chinese-born spy gets 15 years in prison - US news - Security - msnbc.com. (2010, February 8).
Msnbc.com - Breaking News, Science and Tech News, World News, US News, Local
News- Msnbc.com. Retrieved May 23, 2011, from
http://www.msnbc.msn.com/id/35300466/ns/us_news-security/t/chinese-born-engineer-
gets-years-spying/dx
Colin, (2010, January 20). DoD Buzz | Find More Backups for GPS: AF Chief. DoD Buzz |
Online Defense and Acquisition Journal. Retrieved May 26, 2011, from
http://www.dodbuzz.com/2010/01/20/back-away-from-gps-af-chief/
Clarke, R. A., & Knake, R. K. (2010). Cyber war: the next threat to national security and what
to do about it. New York: Ecco.
Cooper, S. (2009, July 10). How China Steals U.S. Military Secrets - Popular Mechanics.
Automotive Care, Home Improvement, Tools, DIY Tips - Popular Mechanics. Retrieved
May 22, 2011, from
http://www.popularmechanics.com/technology/military/news/3319656
Cyberspace Threats Affecting Business and Government in the Information Age 21
Clark, C. (2010, January 20). DoD Buzz | Find More Backups for GPS: AF Chief. DoD Buzz |
Online Defense and Acquisition Journal. Retrieved May 26, 2011, from
http://www.dodbuzz.com/2010/01/20/back-away-from-gps-af-chief/
CSIS. (2011). In the Dark: Crucial Industries Confront Cyberattacks (Rep.).
Gilad, Ben. "The Future of Competitive Intelligence: Contest for the Profession's Soul",
Competitive Intelligence Magazine, 2008, 11(5), 22
Gorman, S. (2009, April 21). Computer Spies Breach Fighter-Jet Project - WSJ.com. Business
News & Financial News - The Wall Street Journal - Wsj.com. Retrieved May 23, 2011,
from http://online.wsj.com/article/SB124027491029837401.html
Gorman, S. (2011, May 31). Pentagon: Online Cyber Attacks Can Count as Acts of War -
WSJ.com. Business News & Financial News - The Wall Street Journal - Wsj.com.
Retrieved May 31, 2011, from
http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html?
mod=WSJ_hp_LEFTTopStories
Granville, J. J. (2003). Dot.Con: The Dangers of Cyber Crime and a Call for Proactive
Solutions. Australian Journal of Politics & History, 49(1), 102-109. Retrieved from
EBSCOhost.
Cyberspace Threats Affecting Business and Government in the Information Age 22
Johnson, R. (2011, February 14). Russian sold secrets for China's first carrier - Washington
Times. Washington Times - Politics, Breaking News, US and World News. Retrieved May
23, 2011, from http://www.washingtontimes.com/news/2011/feb/14/russian-sold-secrets-
for-chinas-first-carrier/
Hambling, D. (2011, March 6). GPS chaos: How a $30 box can jam your life - tech - 06 March
2011 - New Scientist. Science News and Science Jobs from New Scientist - New Scientist.
Retrieved May 26, 2011, from http://www.newscientist.com/article/dn20202-gps-chaos-
how-a-30-box-can-jam-your-life.html
Hayes, J. J. (2008). Have data? Will travel [IT security threat]. Engineering & Technology
(17509637), 3(15), 60-61. doi:10.1049/et:20081510
HSNW. (2011, March 25). Businesses cannot defend against cyber attacks, expert says.
Homeland Security News Wire. Retrieved May 29, 2011, from
http://homelandsecuritynewswire.com/businesses-cannot-defend-against-cyber-attacks-
expert-says
HSNW. (2011, April 22). Dramatic increase in critical infrastructure cyber attacks, sabotage.
Homeland Security News Wire. Retrieved May 29, 2011, from
http://www.homelandsecuritynewswire.com/dramatic-increase-critical-infrastructure-
cyber-attacks-sabotage
Cyberspace Threats Affecting Business and Government in the Information Age 23
Lynch, D. J. (2007, July 27). Law enforcement struggles to combat Chinese spying -
USATODAY.com. News, Travel, Weather, Entertainment, Sports, Technology, U.S. &
World - USATODAY.com. Retrieved May 22, 2011, from
http://www.usatoday.com/money/world/2007-07-22-china-spy-1_N.htm
Lynn, W. J. (2010, September). Defending a New Domain | Foreign Affairs. Home | Foreign
Affairs. Retrieved May 23, 2011, from
http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain
Markoff, J. (2011, January 15). Inside The United States' Secret Sabotage Of Iran : NPR. NPR :
National Public Radio : News & Analysis, World, US, Music & Arts : NPR. Retrieved
May 29, 2011, from http://www.npr.org/2011/05/09/135854490/inside-the-united-states-
secret-sabotage-of-iran
Miller, J. R. (2010, November 16). Internet Traffic from U.S. Government Websites Was
Redirected Via Chinese Networks - FoxNews.com. FoxNews.com - Breaking News |
Latest News | Current News. Retrieved May 25, 2011, from
http://www.foxnews.com/politics/2010/11/16/internet-traffic-reportedly-routed-chinese-
servers/
NewsCore. (2011, March 26). China Confirms Existence of Elite Cyber-Warfare Outfit the 'Blue
Army' - FoxNews.com. FoxNews.com - Breaking News | Latest News | Current News.
Cyberspace Threats Affecting Business and Government in the Information Age 24
Retrieved May 26, 2011, from http://www.foxnews.com/scitech/2011/05/26/china-
confirms-existence-blue-army-elite-cyber-warfare-outfit/
Pravda. China Creates Pirate Copy of Russia’s Su-33 Deck-Based Fighter Jet - English
pravda.ru. (2010, April 6). English Pravda.ru: Russian News and Analysis. Retrieved
May 23, 2011, from http://english.pravda.ru/world/asia/04-06-2010/113664-china_pirate-
0/
Rawnsley, A. (2011, March 7). North Korea Jams GPS in War Game Retaliation | Danger Room
| Wired.com. Wired.com. Retrieved May 26, 2011, from
http://www.wired.com/dangerroom/2011/03/north-korea-jams-gps-in-war-game-
retaliation/
Reuters. (2009, April 21). Pentagon, Lockheed: Fighter Data Not Stolen | News & Opinion |
PCMag.com. Technology Product Reviews, News, Prices & Downloads | PCMag.com |
PC Magazine. Retrieved May 23, 2011, from
http://www.pcmag.com/article2/0,2817,2345699,00.asp
Rhoads, B. C. (2011, May 28). In Censorship Move, Iran Plans Its Own, Private Internet -
WSJ.com. Business News & Financial News - The Wall Street Journal - Wsj.com.
Retrieved May 29, 2011, from
http://online.wsj.com/article/SB10001424052748704889404576277391449002016.html
Cyberspace Threats Affecting Business and Government in the Information Age 25
Size, F. (2009, April 8). Spies Penetrate U.S. Electrical Grid - CBS News. Breaking News
Headlines: Business, Entertainment & World News - CBS News. Retrieved May 29,
2011, from http://www.cbsnews.com/stories/2009/04/08/national/main4928223.shtml
Sternstein 04/13/2011, A. (2011, April 13). U.S. law enforcement agencies struggle to detect
cyberattack sponsors - Nextgov. Nextgov - Federal Technology News, Best Practices, and
Web 2.0 Tools. Retrieved May 25, 2011, from
http://www.nextgov.com/nextgov/ng_20110413_3265.php
CNN. (2010, August 25). Cyberattack in 2008 prompted new Pentagon cyberdefense plan -
CNN. Featured Articles from CNN. Retrieved May 25, 2011, from
http://articles.cnn.com/2010-08-25/tech/pentagon.cyberattack_1_military-networks-
cyberdefense-military-computers?_s=PM:TECH
Magnuson, S. (2010, November 16). Cyber Experts Have Proof That China Has Hijacked U.S.-
Based Internet Traffic: UPDATED. Foxnews.com. Retrieved from
http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=249
Montalbano, E. (2010, July 29). Black Hat: U.S. Infrastructure Vulnerable To Cyber Attack --
InformationWeek. InformationWeek | Business Technology News, Reviews and Blogs.
Retrieved May 29, 2011, from
http://www.informationweek.com/news/government/security/226300202
Cyberspace Threats Affecting Business and Government in the Information Age 26
The Economist. (2007, May 24). Cyberwarfare: Newly nasty | The Economist. The Economist -
World News, Politics, Economics, Business & Finance. Retrieved May 29, 2011, from
http://www.economist.com/node/9228757?Story_ID=E1_JNNRSVS
Thompson, M. (2010, March 30). EMP Risk: Washington, Military Warned on Nuclear Threat -
TIME. Breaking News, Analysis, Politics, Blogs, News Photos, Video, Tech Reviews -
TIME.com. Retrieved May 26, 2011, from
http://www.time.com/time/nation/article/0,8599,1976224,00.html
Waterman, S. (2011, March 23). Senate debates president's power during cyber-attack -
Washington Times. Washington Times - Politics, Breaking News, US and World News.
Retrieved May 26, 2011, from
http://www.washingtontimes.com/news/2011/may/23/senate-debates-presidents-power-
during-cyber-attac/?page=all
Waterman, S. (2011, March 17). China open to cyber-attack - Washington Times. Washington
Times - Politics, Breaking News, US and World News. Retrieved May 29, 2011, from
http://www.washingtontimes.com/news/2011/mar/17/china-open-to-cyber-attack/
Watts, J. (2011, June 3). China brands Google 'snotty-nosed' as cyber feud intensifies | World
news | The Guardian. Latest News, Comment and Reviews from the Guardian |
Guardian.co.uk. Retrieved June 03, 2011, from
http://www.guardian.co.uk/world/2011/jun/03/china-google-cyber-warfare