AD201010708169892AR
AD201010708169892AR

Snarled net could lead to a web of nightmares



The first US news reports show large fuel refinery fires and explosions in Philadelphia and Houston together with lethal clouds of chlorine gas being released from chemical plants in New Jersey and Delaware. Air traffic controllers across major airports begin to panic as they try to identify thousands of planes manually after a total systems collapse at the Federal Aviation Administration National Air Traffic Control Centre in Virginia. Two 747 passenger jets crash in mid-air and train wrecks start to be reported on the ground. The entire eastern seaboard of the US is plunged into darkness. New York's financial computer centres and their back-up locations go down, making it impossible to identify who owns what. The secretary of the Treasury says the entire financial system will dissolve by morning.

In the days that follow, cities run out of food because of the train-system failures and the jumbling of data at trucking and distribution centres. Nuclear power plants go into secure lockdown and many conventional plants' generators are permanently damaged. Unable even to draw cash from ATM machines, many Americans start to loot stores under cover of the blackout. Police and emergency services are quickly overwhelmed.

Despite the fact that no one is sure of the precise origin of the attack, political pressure to strike back at the aggressor mounts and the president orders a counter attack on the states thought most likely to be responsible, thereby ensuring that the conflict goes global. These events are not the work of a Hollywood screenwriter or the opening sequence of the latest Armageddon-style computer game but one of a series of increasingly serious warnings from highly accredited senior sources close to the US defence establishment who believe there is a rising risk of a global conflict where weaknesses in internet defences are exploited - not only for military advantage but also to cripple vital services and utilities.

The former CIA director and US general Michael Hayden told the global technical security conference Black Hat 2010 that the internet is now the "fifth military domain" with air, land, sea and space being the other four. He warned that cyberspace has no real security systems, suggesting that leading nations should band together to outlaw online warfare for fear that it could cause immense damage. According to the US-based consultants Independent Security Evaluators, it would take North Korea only two years and US$100 million (Dh367.3m) to assemble an unstoppable cyber army of 1,000 hackers targeting smart power grids, banks, communications and other key pillars of US infrastructure.

A survey conducted by the security consultancy Sophos reports an increasing public awareness of the growing danger of cyber war. The worldwide survey of more than 1,000 computer users revealed that 77 per cent said there needed to be an international agreement about what types of cyber warfare were acceptable. When asked if it would be acceptable for a country to launch a cyber attack designed to disrupt another state's communications or financial system, 49 per cent said "yes but only in wartime". Only 7 per cent gave an unequivocal yes and 44 per cent said no.

According to Cyber War, a book written by Richard Clarke, the former US national co-ordinator for security, infrastructure protection and counter terrorism, the grim scenario of the effects of a cyber attack on the US detailed above could begin to take place within 15 minutes of an attack by one of several nation states. North Korea is seen as one potential aggressor in a cyber war. The country selects elite students at the elementary-school level to be groomed as future hackers. After being trained in computer programming and hardware in middle and high school, they automatically enrol at the Command Automation University in Pyongyang where they learn how to hack into enemy network systems.

China is also believed to have cyber warfare units housed at a naval base on Hainan Island. The Pentagon believes the Third Technical Department of the People's Liberation Army and the Lingshui Signals Intelligence Facility units on Hainan Island have developed cyber weapons that have never been seen before and that no defences yet designed can stop. "Other nations such as South Korea or Estonia may have greater consumer access to broadband. Others such as the United Arab Emirates may have more internet capable mobile devices per capita," says Mr Clarke. "But few nations have used computer networks as extensively [as the US] to control electric power, pipelines, airlines, railroads, distribution of consumer goods, banking and contractor support of the military ? The US military is no more capable of operating without the internet than Amazon.com would be."

But cyber war is not only a threat to the US. During the Cold War, there was always the fear that any nuclear conflict would soon spread beyond the two superpowers involved. However, if the US did suffer a sustained and highly destructive cyber attack, the president, as commander in chief, would be under great pressure to order an instant reprisal. His first task would be to identify the state that had launched the attack. Unlike a missile attack, a cyber attack might not necessarily be launched from abroad.

According to Mr Hayden, it is not always possible to determine who is carrying out online attacks. Political pressure for the US president to respond with a cyber attack on states perceived as the most likely aggressors could mean launching a retaliatory cyber attack on a country thought to be antagonistic to the US or to be harbouring those responsible for the attack. But cyber attacks and reprisals do not respect national boundaries in a world where states depend on one another for vital services and where internet-run financial services extends across borders.

With Gulf countries currently orchestrating a shared power grid, there would be a strong likelihood of a cyber conflict quickly spreading across the entire region with devastating social and economic results. business@thenational.ae

The Bio

Favourite place in UAE: Al Rams pearling village

What one book should everyone read: Any book written before electricity was invented. When a writer willingly worked under candlelight, you know he/she had a real passion for their craft

Your favourite type of pearl: All of them. No pearl looks the same and each carries its own unique characteristics, like humans

Best time to swim in the sea: When there is enough light to see beneath the surface

SPECS

Engine: 4-litre V8 twin-turbo
Power: 630hp
Torque: 850Nm
Transmission: 8-speed Tiptronic automatic
Price: From Dh599,000
On sale: Now

Guns N’ Roses’s last gig before Abu Dhabi was in Hong Kong on November 21. We were there – and here’s what they played, and in what order. You were warned.

  • It’s So Easy
  • Mr Brownstone
  • Chinese Democracy
  • Welcome to the Jungle
  • Double Talkin’ Jive
  • Better
  • Estranged
  • Live and Let Die (Wings cover)
  • Slither (Velvet Revolver cover)
  • Rocket Queen
  • You Could Be Mine
  • Shadow of Your Love
  • Attitude (Misfits cover)
  • Civil War
  • Coma
  • Love Theme from The Godfather (movie cover)
  • Sweet Child O’ Mine
  • Wichita Lineman (Jimmy Webb cover)
  • Wish You Were Here (instrumental Pink Floyd cover)
  • November Rain
  • Black Hole Sun (Soundgarden cover)
  • Knockin’ on Heaven’s Door (Bob Dylan cover)
  • Nightrain

Encore:

  • Patience
  • Don’t Cry
  • The Seeker (The Who cover)
  • Paradise City
Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%20%3C%2Fstrong%3ENamara%0D%3Cbr%3E%3Cstrong%3EStarted%3A%20%3C%2Fstrong%3EJune%202022%0D%3Cbr%3E%3Cstrong%3EFounder%3A%20%3C%2Fstrong%3EMohammed%20Alnamara%0D%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EDubai%20%0D%3Cbr%3E%3Cstrong%3ESector%3A%20%3C%2Fstrong%3EMicrofinance%0D%3Cbr%3E%3Cstrong%3ECurrent%20number%20of%20staff%3A%20%3C%2Fstrong%3E16%0D%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%20%3C%2Fstrong%3ESeries%20A%0D%3Cbr%3E%3Cstrong%3EInvestors%3A%20%3C%2Fstrong%3EFamily%20offices%0D%3Cbr%3E%3C%2Fp%3E%0A
EU's%2020-point%20migration%20plan
%3Cp%3E1.%20Send%20EU%20border%20guards%20to%20Balkans%3C%2Fp%3E%0A%3Cp%3E2.%20%E2%82%AC40%20million%20for%20training%20and%20surveillance%3C%2Fp%3E%0A%3Cp%3E3.%20Review%20EU%20border%20protection%3C%2Fp%3E%0A%3Cp%3E4.%20Reward%20countries%20that%20fund%20Balkans%C2%A0%3C%2Fp%3E%0A%3Cp%3E5.%20Help%20Balkans%20improve%20asylum%20system%3C%2Fp%3E%0A%3Cp%3E6.%20Improve%20migrant%20reception%20facilities%C2%A0%3C%2Fp%3E%0A%3Cp%3E7.%20Close%20gaps%20in%20EU%20registration%20system%3C%2Fp%3E%0A%3Cp%3E8.%20Run%20pilots%20of%20faster%20asylum%20system%3C%2Fp%3E%0A%3Cp%3E9.%20Improve%20relocation%20of%20migrants%20within%20EU%3C%2Fp%3E%0A%3Cp%3E10.%20Bolster%20migration%20unit%20in%20Greece%3C%2Fp%3E%0A%3Cp%3E11.%20Tackle%20smuggling%20at%20Serbia%2FHungary%20border%3C%2Fp%3E%0A%3Cp%3E12.%20Implement%20%E2%82%AC30%20million%20anti-smuggling%20plan%3C%2Fp%3E%0A%3Cp%3E13.%20Sanctions%20on%20transport%20linked%20to%20smuggling%3C%2Fp%3E%0A%3Cp%3E14.%20Expand%20pilot%20deportation%20scheme%20in%20Bosnia%C2%A0%3C%2Fp%3E%0A%3Cp%3E15.%20Training%20for%20Balkans%20to%20deport%20migrants%3C%2Fp%3E%0A%3Cp%3E16.%20Joint%20task%20forces%20with%20Balkans%20and%20countries%20of%20origin%3C%2Fp%3E%0A%3Cp%3E17.%20Close%20loopholes%20in%20Balkan%20visa%20policy%C2%A0%3C%2Fp%3E%0A%3Cp%3E18.%20Monitor%20migration%20laws%20passed%20in%20Balkans%C2%A0%3C%2Fp%3E%0A%3Cp%3E19.%20Use%20visa-free%20travel%20as%20leverage%20over%20Balkans%C2%A0%3C%2Fp%3E%0A%3Cp%3E20.%20Joint%20EU%20messages%20to%20Balkans%20and%20countries%20of%20origin%3C%2Fp%3E%0A