Difference between revisions of "IDefense"

From Powerbase
Jump to: navigation, search
(Cyberterrorism)
Line 7: Line 7:
 
I-Defense CEO James Adams was quoted in an interview with ''USA Today'' commenting on potential cyberterrorist attacks, he said:
 
I-Defense CEO James Adams was quoted in an interview with ''USA Today'' commenting on potential cyberterrorist attacks, he said:
  
:"Al-Qaeda doesn't see cyberterrorism as achieving significant military goals. They see the world in a rather old-fashioned way, where bombings and shootings have direct impact and scare people." He went on to say that "There are a large number of threats: hackers, cybercriminals, other countries," says Amit Yoran, director of the Department of Homeland Security's National Cyber Security Division. "It goes beyond al-Qaeda.<ref>Jon Swartz, [http://www.usatoday.com/tech/news/2004-08-02-cyber-terror_x.htm Cyberterror impact, defense under scrutiny], USA Today, 2-August-2004, Accessed 12-December-2009</ref>."
+
:"Al-Qaeda doesn't see cyberterrorism as achieving significant military goals. They see the world in a rather old-fashioned way, where bombings and shootings have direct impact and scare people."<ref>Jon Swartz, [http://www.usatoday.com/tech/news/2004-08-02-cyber-terror_x.htm Cyberterror impact, defense under scrutiny], USA Today, 2-August-2004, Accessed 12-December-2009</ref>."
  
 
In an interview with PBS Adams described the danger posed by cyberterrorism:
 
In an interview with PBS Adams described the danger posed by cyberterrorism:
  
:"you and I can go into our local computer store and buy what is essentially an immensely powerful weapon: the computer. And you can load that weapon with very powerful bullets, which are hacks downloaded from the web, and you can fire that weapon at pretty much anybody you choose"<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
+
:"You and I can go into our local computer store and buy what is essentially an immensely powerful weapon: the computer. And you can load that weapon with very powerful bullets, which are hacks downloaded from the web, and you can fire that weapon at pretty much anybody you choose"<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
  
 
===Cyberterrorism as the Next World War===
 
===Cyberterrorism as the Next World War===
Line 26: Line 26:
  
 
:"Well, from a personal perspective, because I've seen so much of the consequences of war and of chaos, I wish to play a part in not having chaos. My job is not offensive information warfare. Could we have the capability if we chose? Sure. But would I ever launch an offensive attack? Absolutely not. That's not our business. If others choose to do that, fine. All I provide is the intelligence that says, "This is an indication, this is a warning, this is what you need to do." And I can then serve, not just America, but I can serve Japan and Asia from iDefense Japan, and I can serve Europe from iDefense UK. So hopefully, I can serve the globe without fear or favor in an impartial way, with intelligence that enables everybody to defend themselves"<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
 
:"Well, from a personal perspective, because I've seen so much of the consequences of war and of chaos, I wish to play a part in not having chaos. My job is not offensive information warfare. Could we have the capability if we chose? Sure. But would I ever launch an offensive attack? Absolutely not. That's not our business. If others choose to do that, fine. All I provide is the intelligence that says, "This is an indication, this is a warning, this is what you need to do." And I can then serve, not just America, but I can serve Japan and Asia from iDefense Japan, and I can serve Europe from iDefense UK. So hopefully, I can serve the globe without fear or favor in an impartial way, with intelligence that enables everybody to defend themselves"<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>.
 
 
  
 
==Personnel==
 
==Personnel==

Revision as of 00:57, 13 December 2009

iDefense is an Internet security consultancy which is one of the few entities that have made references to the mysterious Global Islamic Media Front[1].

The CEO of the company is James Adams (UK journalist) who is the former CEO of UPI and the Ashland Institute for Strategic Studies[2][3]. Adams regularly makes comments in the media about the dangers posed by cyberterrorism.[4][5].

Cyberterrorism

I-Defense CEO James Adams was quoted in an interview with USA Today commenting on potential cyberterrorist attacks, he said:

"Al-Qaeda doesn't see cyberterrorism as achieving significant military goals. They see the world in a rather old-fashioned way, where bombings and shootings have direct impact and scare people."[6]."

In an interview with PBS Adams described the danger posed by cyberterrorism:

"You and I can go into our local computer store and buy what is essentially an immensely powerful weapon: the computer. And you can load that weapon with very powerful bullets, which are hacks downloaded from the web, and you can fire that weapon at pretty much anybody you choose"[7].

Cyberterrorism as the Next World War

In an interview with Frontline, Adams described how intelligence agencies see cyberterrorism as the next world war:

". . . For example, when I was in Moscow a couple of years ago, it was very clear to me, from talking to the senior people in the scientific and intelligence communities, that they already feel they're at war. They are convinced that they are engaged in the next world war, that it is happening in cyberspace, and that they're losing. They're very active in the area, but they think that America has a very significant advantage, which is why the Russians have come up with two proposals for arms control agreements in cyberspace"[8].
"Well, they haven't got much of a reception for that, because America and its allies think that we're winning the war, so why should we have a treaty? But it is a very dynamic environment, where everybody sees that they need to play, and everybody is trying to seize advantage. And all the aggressors currently have the opportunity, because nobody is properly defended"[9].

The role of i-Defense in combatting cyberterrorism

Adams describes the role of i-Defense in

"Well, from a personal perspective, because I've seen so much of the consequences of war and of chaos, I wish to play a part in not having chaos. My job is not offensive information warfare. Could we have the capability if we chose? Sure. But would I ever launch an offensive attack? Absolutely not. That's not our business. If others choose to do that, fine. All I provide is the intelligence that says, "This is an indication, this is a warning, this is what you need to do." And I can then serve, not just America, but I can serve Japan and Asia from iDefense Japan, and I can serve Europe from iDefense UK. So hopefully, I can serve the globe without fear or favor in an impartial way, with intelligence that enables everybody to defend themselves"[10].

Personnel

Contact

Related Articles

  • Shaun Waterman, "Cyber-jihadis use of encryption", UPI, January 30, 2007

Notes

  1. Cyber Security, [ENCRYPTION SOFTWARE OF ISLAMIC GROUP IS ANALYZED], Technology Daily AM Edition, 31-July-2007, Accessed 29-September-2009 via NexisUK
  2. Jon Swartz, Cyberterror impact, defense under scrutiny, USA Today, 2-August-2004, Accessed 12-December-2009
  3. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  4. Jon Swartz, Cyberterror impact, defense under scrutiny, USA Today, 2-August-2004, Accessed 12-December-2009
  5. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  6. Jon Swartz, Cyberterror impact, defense under scrutiny, USA Today, 2-August-2004, Accessed 12-December-2009
  7. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  8. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  9. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
  10. Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009