Difference between revisions of "IDefense"
(→Cyberterrorism) |
(→Cyberterrorism as the Next World War) |
||
Line 17: | Line 17: | ||
In an interview with ''Frontline'', Adams described how intelligence agencies see cyberterrorism as the next world war: | In an interview with ''Frontline'', Adams described how intelligence agencies see cyberterrorism as the next world war: | ||
− | :. . . For example, when I was in Moscow a couple of years ago, it was very clear to me, from talking to the senior people in the scientific and intelligence communities, that they already feel they're at war. They are convinced that they are engaged in the next world war, that it is happening in cyberspace, and that they're losing. They're very active in the area, but they think that America has a very significant advantage, which is why the Russians have come up with two proposals for arms control agreements in cyberspace | + | :. . . For example, when I was in Moscow a couple of years ago, it was very clear to me, from talking to the senior people in the scientific and intelligence communities, that they already feel they're at war. They are convinced that they are engaged in the next world war, that it is happening in cyberspace, and that they're losing. They're very active in the area, but they think that America has a very significant advantage, which is why the Russians have come up with two proposals for arms control agreements in cyberspace<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>. |
:Well, they haven't got much of a reception for that, because America and its allies think that we're winning the war, so why should we have a treaty? But it is a very dynamic environment, where everybody sees that they need to play, and everybody is trying to seize advantage. And all the aggressors currently have the opportunity, because nobody is properly defended<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>. | :Well, they haven't got much of a reception for that, because America and its allies think that we're winning the war, so why should we have a treaty? But it is a very dynamic environment, where everybody sees that they need to play, and everybody is trying to seize advantage. And all the aggressors currently have the opportunity, because nobody is properly defended<ref>Frontline, [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html Interview with James Adams], ''Frontline'', Accessed 12-December-2009</ref>. |
Latest revision as of 01:04, 13 December 2009
iDefense is an Internet security consultancy which is one of the few entities that have made references to the mysterious Global Islamic Media Front[1].
The CEO of the company is James Adams (UK journalist) who is the former CEO of UPI and the Ashland Institute for Strategic Studies[2][3]. Adams regularly makes comments in the media about the dangers posed by cyberterrorism.[4][5].
Contents
Cyberterrorism
I-Defense CEO James Adams was quoted in an interview with USA Today commenting on potential cyberterrorist attacks, he said:
- Al-Qaeda doesn't see cyberterrorism as achieving significant military goals. They see the world in a rather old-fashioned way, where bombings and shootings have direct impact and scare people[6].
In an interview with PBS Adams described the danger posed by cyberterrorism:
- You and I can go into our local computer store and buy what is essentially an immensely powerful weapon: the computer. And you can load that weapon with very powerful bullets, which are hacks downloaded from the web, and you can fire that weapon at pretty much anybody you choose[7].
Cyberterrorism as the Next World War
In an interview with Frontline, Adams described how intelligence agencies see cyberterrorism as the next world war:
- . . . For example, when I was in Moscow a couple of years ago, it was very clear to me, from talking to the senior people in the scientific and intelligence communities, that they already feel they're at war. They are convinced that they are engaged in the next world war, that it is happening in cyberspace, and that they're losing. They're very active in the area, but they think that America has a very significant advantage, which is why the Russians have come up with two proposals for arms control agreements in cyberspace[8].
- Well, they haven't got much of a reception for that, because America and its allies think that we're winning the war, so why should we have a treaty? But it is a very dynamic environment, where everybody sees that they need to play, and everybody is trying to seize advantage. And all the aggressors currently have the opportunity, because nobody is properly defended[9].
The role of i-Defense in combatting cyberterrorism
Adams describes the role of i-Defense in
- Well, from a personal perspective, because I've seen so much of the consequences of war and of chaos, I wish to play a part in not having chaos. My job is not offensive information warfare. Could we have the capability if we chose? Sure. But would I ever launch an offensive attack? Absolutely not. That's not our business. If others choose to do that, fine. All I provide is the intelligence that says, "This is an indication, this is a warning, this is what you need to do." And I can then serve, not just America, but I can serve Japan and Asia from iDefense Japan, and I can serve Europe from iDefense UK. So hopefully, I can serve the globe without fear or favor in an impartial way, with intelligence that enables everybody to defend themselves[10].
Personnel
- James Adams (UK journalist) - CEO
- Rick Howard - Director - iDefense Intelligence
- Ken Dunham - Director - Rapid Response Team
- Andretta Summerville - Middle East analyst
- Jim Melnick - Director of Threat Intelligence
Contact
- Website: http://labs.idefense.com/
Related Articles
- Shaun Waterman, "Cyber-jihadis use of encryption", UPI, January 30, 2007
Notes
- ↑ Cyber Security, [ENCRYPTION SOFTWARE OF ISLAMIC GROUP IS ANALYZED], Technology Daily AM Edition, 31-July-2007, Accessed 29-September-2009 via NexisUK
- ↑ Jon Swartz, Cyberterror impact, defense under scrutiny, USA Today, 2-August-2004, Accessed 12-December-2009
- ↑ Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
- ↑ Jon Swartz, Cyberterror impact, defense under scrutiny, USA Today, 2-August-2004, Accessed 12-December-2009
- ↑ Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
- ↑ Jon Swartz, Cyberterror impact, defense under scrutiny, USA Today, 2-August-2004, Accessed 12-December-2009
- ↑ Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
- ↑ Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
- ↑ Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009
- ↑ Frontline, Interview with James Adams, Frontline, Accessed 12-December-2009