The threat of crowdsourced terrorism

November 18, 2017 11:02 pm | Updated November 19, 2017 09:49 am IST -

Experts say attacks on critical infrastructure will soon enter the cyber warfare phase.

Experts say attacks on critical infrastructure will soon enter the cyber warfare phase.

As leading cybersecurity experts from India, the United States and Israel took to the stage on the second day of the Security 360 conference in the city on Saturday, the consensus that emerged was that “crowdsourced” or “direct-to-home” terrorism, presently practised by the Islamic State (IS), was likely to dominate the rest of the 21st century.

M.K. Narayanan, the country’s National Security Adviser between 2005 and 2010, said more often than not, most “lone wolf attacks” on foreign soil were remotely plotted by IS handlers from thousands of miles away. “The global diffusion of IT, transport and finance networks will make the asymmetric threats by non-state actors like IS more potent. IS has been exploiting direct-to-home jihad and we will only see more of it. We will see more of cyber planners and virtual coaches,” he said.

Michael Chertoff, the second U.S. Secretary of Homeland Security and served under President George W. Bush, said the time of grand strategies by powerful nation states was a thing of the past. He said it was now the age of little strategies, as terrorism has gone the crowdsourcing way. “Nation-states and their intelligence agencies may find themselves severely challenged to counter such terrorism. Local authorities and communities will be called upon to get more involved in security. Intelligence agencies cannot know what is happening in your coffee shops,” he said.

According to Mr. Narayanan, asymmetric threats are likely to cooperate and network with insurgencies, leading to considerable geographical area control. He predicted that attacks on critical infrastructure would enter the cyber warfare phase, covering nation-states and trying to cripple the defences of other countries including satellites, missiles and nuclear capabilities.

‘Harder to predict the future’

Has the ability of intelligence agencies to predict the future improved with social media as well as open and crowdsourced intelligence gathering systems? The answer is a resounding no. In fact, it has dropped, according to Uzi Arad, former chief of the Israeli intelligence agency Mossad. “The same technology that has created this benefit for agencies has also made their monitoring more difficult and complex. The subject is more elusive than ever,” he said.

Technology has always played a key role in the shifting geopolitical landscape. But today, social media and information channels have not only been decentralised but are also privatised. “The new battlefield is of ideas, news and propaganda seeking to influence mindsets. This is evident in the Russian involvement in the U.S. elections,” he said. “Diverse social processes and populism have thrown up unpredictable leaders, complicating the predictability of the future.”

Of cyberspace and cryptocurrency

They say crime does not pay, but is cyber making it pay? This was the question posed by Pindar Wong, an Internet pioneer from Hong Kong.

The use of cryptocurrency and tokens to finance terror and crime, and the difficulty to crack down on this in the cyberspace, was touched upon by many speakers. “Today we have a whopping 1,297 [types of] cryptocurrency in the world. Bitcoin is just one of them,” said Mr. Wong. And their complexity and variety are increasing exponentially. “We need to make fighting crime pay. The manufacturers of Internet of Things (IoT) devices need to be incentivised to make them safe,” he said.

At another session on cybersecurity in business, it was proposed that cybersecurity was no longer a technology problem, but a boardroom dilemma. Tobby Simon, president and founder of Synergia Foundation, said that cybersecurity was today a leadership issue in any firm, as hiring the best technology was no guarantee of safety from cyberattacks.

Ajay Nanavati, chairman of Syndicate Bank, made a candid admission that in most of the boards he is part of, the top management does not understand cybersecurity. “When people on the board do not understand [this], it follows that the resources allotted towards the issue are not adequate,” he said.

Sharing threat perception

Meanwhile, former Research and Analysis Wing chief P.K. Hormis Tharakan batted for more open sharing of intelligence, especially threat perceptions, with the public.

“We at least owe the public and need to share the threat perception to help them take precautions. At present, there is no security classification as to what can be revealed,” he said.

Mr. Tharakan later told The Hindu that making threat perceptions public should be carefully thought through (to either colour code or number the level of threat perception). “We need to lay down criteria for threat classification and the standard operating procedure (SOP) [to combat] these threats,” he said.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.