Cyberterror and Cyberdefense: Where We Stand Five Years After 9/11

September 8th, 2006 |

Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
This post can be linked to directly with the following short URL:

The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other

The audio player code can be used without the image as follows:

This audio file can be linked to by copying the following URL:

Right/Ctrl-click to download the audio file.
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email

BOSTON, September 8, 2006 (PodTech News) — After the 9/11 attacks, there was talk of a cyber Pearl Harbor, in which trained terrorist groups would use computers and the Internet to attack critical infrastructure in the United States. Five years on, that has yet to happen. But that does not mean terrorist groups have not figured out how to use the internet to recruit, share best practices and — most of all — raise money through fraud and cybercrime. To find out where the threats are, and how the U.S. government is dealing with them, PodTech’s Clark Boyd speaks with Noah Shacthman, who runs the website, and Alan Paller, director of the SANS Institute.

Reporter’s Notes:

While both Noah Shachtman and Alan Paller are skeptical of a cyber Pearl Harbor, both admit that somewhere, down the line, it could become a reality. It’s just that, for now, it doesn’t seem to be in any terrorist group’s playbook. What really stuck with me was Paller’s push to admit that our defenses will be penetrated, and that we can use that to our advantage to catch terrorists and criminals AS they break into systems. Noah’s website covers the issue — here and here are two places to start. The SANS Institute’s website is also a good place to look for more information. The music in the podcast comes courtesy of SpunkShine.

— Clark Boyd

Tags: , , , ,
Posted in: Connected Social Media, PodTech News, Security, Technology