Cyberterror and Cyberdefense: Where We Stand Five Years After 9/11

September 8th, 2006 |
Image for FaceBook
Download Audio FileRight click here to download audio | Share The Connected Social Media Player

 

BOSTON, September 8, 2006 (PodTech News) — After the 9/11 attacks, there was talk of a cyber Pearl Harbor, in which trained terrorist groups would use computers and the Internet to attack critical infrastructure in the United States. Five years on, that has yet to happen. But that does not mean terrorist groups have not figured out how to use the internet to recruit, share best practices and — most of all — raise money through fraud and cybercrime. To find out where the threats are, and how the U.S. government is dealing with them, PodTech’s Clark Boyd speaks with Noah Shacthman, who runs the website www.defensetech.org, and Alan Paller, director of the SANS Institute.

Reporter’s Notes:

While both Noah Shachtman and Alan Paller are skeptical of a cyber Pearl Harbor, both admit that somewhere, down the line, it could become a reality. It’s just that, for now, it doesn’t seem to be in any terrorist group’s playbook. What really stuck with me was Paller’s push to admit that our defenses will be penetrated, and that we can use that to our advantage to catch terrorists and criminals AS they break into systems. Noah’s website covers the issue — here and here are two places to start. The SANS Institute’s website is also a good place to look for more information. The music in the podcast comes courtesy of SpunkShine.

— Clark Boyd

Share

Posted in: Connected Social Media, PodTech News, Security, Technology
Tags: , , , ,


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.