Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche

Threats to Information Systems on the Rise

Threats to Information Systems on the Rise

By Special Agent Daniel Fleeger, Air Force Office of Special Investigations.

Andrews Air Force Base, Maryland -- April 30, 2001 (AFPN) -- As Air Force reliance on computers and information systems has grown, so has the propensity for adversaries to exploit them to do damage.

The Air Force has experienced a steady increase in the number of attacks against its information systems, and experts agree that the number of attacks is only going to increase.

One reason is the availability, ease of use, and sophistication of publicly available computer-attack software. Such attacks once required the skills of a computer expert. They can now be achieved by the novice computer user armed with easily obtained software.

The novice attacker is not the only threat. In general terms, computer and information systems attackers can be grouped into five major categories.

The foreign intelligence service operative is an aggressive adversary who attempts to exploit the information infrastructure for intelligence purposes. He or she can identify members, evaluate their level of access to information of intelligence value, and even recruit their services -- all in cyberspace. There are significant advantages to doing business this way, such as easily concealing one's identity and gaining information rapidly.

The cyberterrorist attack goes beyond mere computer intrusions, denials of service or defacing of Web pages to actual destruction of data or systems. Use of the Internet and other information systems give terrorist groups a global and near real-time command and control communications capability. Because such groups have limited resources, and electronic intrusion can help them achieve their objectives at minimal cost, it's expected that cyberterrorism will increase.

Organized crime targets computer systems to commit fraud, acquire and exploit proprietary information, and steal funds. Criminal organizations use electronic intrusion to hinder police investigations, collect intelligence, destroy or alter data on investigations, and monitor the activities of informants.

Hackers, not too many years ago, were motivated primarily by curiosity about computer systems and network operations. In most cases, they were unlikely to engage in serious criminal activities. In contrast, today's hackers appear to be motivated by greed, revenge and politics, and their actions have become more malicious. They are more likely to aim their attacks not just at individuals, but also at enterprise information systems.

The malicious insider, who has legitimate access to proprietary information and mission-critical systems, poses a significant threat because of having trusted status and familiarity with security practices. When an insider betrays his trust, he has a much greater opportunity and ability to do harm than anyone on the outside. Moreover, he is less likely to be detected. The malicious insider, motivated by greed, revenge, or even political ideology, can act alone or with outsiders.

The threats to Air Force information systems are numerous and significant. To combat them, the Air Force Office of Special Investigations brings to bear a number of capabilities, including defensive briefings to high-risk units and personnel, countermeasures against technical surveillance devices (or "bugs"), computer crime investigators who specialize in combating crimes against computers and information systems and counterintelligence investigations.

But OSI can't do it alone. Everyone with access to computers and information systems is a partner in the war against cyber threats. If you detect intrusion activity, or receive unsolicited or suspicious e-mail, or discover new software or tools on your computer, or witness unescorted visitors in your work area, you should immediately contact your security manager or the local OSI detachment.

Familiarize yourself with the signs that an insider might be up to no good. Be wary of an insider who shows a keen interest in hacking techniques and system vulnerabilities. Take note if an insider has configured his or her computer to provide capabilities that it shouldn't have. Other traditional indicators may be observable too, such as unexplained affluence, abnormal requests for information, and a propensity for security violations.

 

Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin





Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).

Contact