->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

Internet Wire

Cyber Warfare Risk far exceeds The Millennium Bug (Y2k)

London, UK, 30th March 1999 - DK Matai, the Founder and Managing Director of mi2g (www.mi2g.com) announced today that "The risk associated with Cyber Warfare will overtake the Millennium Bug issue for financial institutions, government and military establishments very soon. Given that 205 Million people used the internet in 1998 and this figure is going to exceed 420 Million users by 2001, the risk associated with Cyber Warfare is growing exponentially".

mi2g, a leading authority on high security Knowledge Systems engineering, published an internal memorandum on 11th January 1999 for Lloyd's of London syndicates and London Market broker clients, which is now being made public.

According to mi2g, if Cyber Warfare risk is calculated as a function of the network exposure of government, private, financial and military institutions, it greatly exceeds the Millennium bug risk, which is essentially a computing design risk. According to the law of network access, the total risk is a product of the individual risks at each node of the network and is directly proportional to the square of the accessible nodes. It can be seen that the risk from hacking on the internet with, say, 100 Million vulnerable nodes is of the order of 1016 (100 Million X 100 Million) times as high as the individual risk to a single computer.

Hence DK Matai emphasizes that, "The Millennium bug is a dwarfed problem in comparison to Cyber Warfare, which places even the mightiest military and financial institutions at substantial risk if continuous surveillance systems and counter-hacking measures are not deployed immediately."
Public Reproduction of the mi2g Internal Memorandum of 11th January 1999

 

The Threat to Government, Business and Financial Markets

mi2g internal memorandum

Cyber Warfare

Perspective

Historically war has been classified as physical attacks with bombs & bullets between nation states. It was beyond the means of an individual to wage war.

Today, in the Information Age, the launch pad for war is no longer a runway but a computer. The attacker is no longer a pilot or soldier but a civilian Hacker. An individual with relatively simple computer capability can do things via the internet that can impact economic infrastructures, social utilities and national security. This is the problem we face in moving from the industrial world to the Information Age, which is the essence of Cyber War.

The Internet was developed during the cold war climate of the 1960s to protect communications in the event of a nuclear strike. The main strength of the internet is that if parts of the network are destroyed information automatically re-routes. In essence there is no Central Control that can be targeted. It is this very anonymity and the anarchy of the Internet that leaves organisations open to attack.

Problem

The problem is that Western societies have in the past few decades become reliant on the efficient functioning of electronic control systems for more and more segments of daily life, especially the economic processes. There is an assumption that they will function flawlessly or that there is a readily available standby in every case. There is also a misunderstanding about communications systems. Communications systems are now just computers that route information on the back of commands.

If these electronic systems go wrong the technology that supports our economies fails. As the global network of computers, the Internet, becomes the communication backbone, all societies reliant upon it are vulnerable to cyber attack.

As Stephen Badsey of Sandhurst Royal Military Academy states:

'...attack a society through its computers to cause the breakdown of the mechanism & the infrastructure which cause it to run, you will bring about mass deaths......directly or indirectly...'

Threat

It is possible to attack and interrupt any electronic network which would naturally include power stations, emergency services, stock market and air traffic control systems, with devastating consequences. The consequences are so serious that the American Government tried to suppress a report titled 'Cyberwar is Coming' by researchers at RAND, an American think tank, in 1992.

The dangers of Cyber attack lie in the Information Age allowing individuals, who choose to conceal their identity, to access something valuable electronically without being detected. A business could be shut down or severely damaged through this covert access. In May 1998 the L0pht Collective, a group of computer hackers in Boston USA, testified to a US Senate Committee studying network security:

'The seven of us could very trivially take down the entire Internet for the United States......Great Britain......basically stopping communications between all the major network access providers. That would cause overloads on to the other transit routes for communication, regular phone lines. It would cause problems for people trying to move large sums of money that are doing it over networks......Take about thirty minutes......if that'

Where is this threat coming from?

The generic term used is Hacker - but this merely means someone who has been able to penetrate any kind of defence. The motives of Hackers vary. Some destroy data, or there can be criminal intent; others could be terrorists or university students taking on the challenge. No matter who the Hackers are or their motives the equipment that is required is readily available and within the purchasing power of all.

The knowledge required can be found on notice boards posted on the Internet. Readymade formulae are available to be copied with instructions on how to dispatch attacks. This allows 'warfare' to be taken out of the national fold and readily available to groups and individuals at anytime, anywhere in the world.

Associated Repercussions

The above problem will be compounded by the new Data Protection Act 1998 in the UK which extends the envelope of criminal prosecution against the Directors of a company that fail to satisfactorily protect their corporate assets, which has now been defined to include corporate information. Furthermore this type of legislation is not promoted in the USA creating an anomaly which may also effect Anglo-American companies who regularly exchange information.

 

About mi2g

mi2g is a three year old, Central London based e-commerce software house whose Chairman is Sir Christopher Benson. Sir Christopher has been shaping the banking and finance sector strategy of mi2g since becoming Chairman in early 1997.

mi2g's main business to business activities are:
1. On-line Security Systems for Large Corporations using artificial intelligence
2. E-commerce System Design based on high level security and client profiling
3. Subject specific e-commerce lounge development with over 3 Million visitors
4. Internet Marketing Intelligence Software using supercomputing technology

mi2g works with financial institutions in the banking, insurance and re-insurance sector to develop bespoke e-commerce solutions for large business-to-business and business-to-consumer projects. mi2g also assists in the proper assessment and solution of the Cyber Warfare threat faced by organisations deploying complex computer networks.

mi2g's client list includes companies such as Amazon.com (USA), Cendant Corp (USA), Department of Trade and Industry (UK Government), Euler (France), First Premier Bank (USA), Granville Bank (UK), Greek Royal Family, Lloyd's of London (UK), Nations Bank, Progressive Insurance (USA) and Spydamedia (UK).

Since 1995, mi2g has also been developing an automatic business-to-consumer e-commerce airport with specific lounges and intelligent ferrets. carlounge.com, gameslounge.com and lawlounge.com are the pilots which are now up and running for tests and have 3 million visitors. The airport, lounges and ferrets are unique technology to mi2g and its visitors and will function together by the year 2000.

The airport lounges are designed to provide the best price for a product the visitor desires. They are reverse auction categorised shopping systems that appear to run uniquely for each visitor via the chosen ferret. They will work not only in English but also German and French. The lounges will focus on products such as cars; computer games; personal finance - investments, insurance, mortgages, loans and other credit instruments; branded consumer goods - books, music tracks, video and leisure with travel bookings.

The ferret helps the airport lounge visitors to find and filter automatically the most cost efficient pre-qualified vendors (such as Amazon.com, E-Bay, E*Trade etc), of quality goods and services, place an order in high security, and have the product delivered in the minimum amount of time and shipping cost.

DK Matai, the Founder and Managing Director of mi2g has worked in the R & D Labs of IBM Inc, Inmos SGS-Thomson SA and OY Helvar-Electrosonic on Massive Parallel Processing (MPP) Vector Computer Engineering, 200MHz RISC Processor Design and HDTV Video Wall Development respectively.

Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy