Computer Attacks

U.S. Government and private-sector computer networks present a very attractive target for illicit activities. Computer intruders can move freely without reference to state or national borders and can perform their tasks without gaining physical access to the system under attack. These factors make it more difficult to detect the theft of information and the origin of the intruder.

Hacking U.S. Government Computers from Overseas describes four cases of foreign hackers, operating from overseas, who made significant intrusions into U.S. military and other government computer systems.  

The Computer Security Institute in conjunction with the San Francisco FBI field office conducts an annual Computer Crime and Security Survey. The 2004 survey received 486 responses from a diverse sample of organizations in both the private and the public sectors. Seventy-eight percent of the respondents reported having detected at least one incident of a computer attack or costly computer misuse during the previous year. Most reported multiple incidents, and 12 percent reported being aware of 10 or more such incidents.1

The types of incidents, percentage of organizations reporting each type of incident, and the financial costs of these incidents are shown in the table below. It is noteworthy that most organizations were either unable or unwilling to estimate the dollar costs of these incidents, so the dollar figures in the table are summary costs for just 269 organizations.

Incident Percentage Dollar Cost
Virus 78% $55,053,900
Insider abuse of network access 59% $10,601,055
Laptop theft 49% $6,734,500
System penetration 39% $901,500
Unauthorized access to information 37% $4,278,205
Denial of service 17% $26,064,050
Theft of proprietary information 10% $11,460,000
Telecom fraud 5% $3,997,500
Financial fraud 5% $7.670,500
Sabotage 3% $871,000

There can be considerable variation in these figures from one year to the next. In previous surveys since 1999, theft of proprietary information accounted for the greatest loss. In the 2003 survey, for example, the theft of proprietary information was valued at $70,195,900, or an average of approximately $2.7 million per reported loss.

It is impossible to know the extent to which foreign governments and other foreign organizations or individuals are behind these incidents. The 2004 survey report does not cover that topic, but the report on the 2003 version of the same survey does have the respondents' views on the "likely sources of attack." Twenty-eight percent of respondents attributed attacks to foreign governments, 25% to foreign corporations, 82% to independent hackers, 40% to U.S. competitors, and 77% to disgruntled employees. This adds up to over 100% because most respondent organizations had multiple attacks.

The 2004 survey showed that only 20 percent of the respondents that experienced computer intrusions reported these crimes to law enforcement authorities. There is reluctance on the part of the private sector to report allegations of computer and economic crime to law enforcement authorities. A large number of these crimes go unreported because of a company's fear of undermining the confidence of their shareholders, negative publicity, and further exposure of trade secret information during prosecution.

Similar results were found by the Deloitte & Touche accounting firm when it conducted face-to-face interviews with senior information technology executives of the top 100 global financial services organizations. Eighty-three percent of these firms had had an external attack on their information technology systems within the previous year, which was up from 39% a year earlier. Of this group, 40% said that the security breaches had resulted in financial losses to their organization.2

Related Topics: Computer Vulnerabilities, The Insider Threat to Information Systems.

Reference
1. Lawrence Gordon, Martin Loeb, William Lucyshyn, Robert Richardson. 2004 CSI/FBI Computer Crime and Security Survey. Computer Security Institute, 2004.
2. Deloitte & Touche. Global Security Survey 2004.
Accessed on the Internet, Dec. 29, 2004, www.deloitte.com/dtt/research/0,2310,sid%3D1000%26cid%3D48978,00.html

 

HOME   |   WHO'S DOING WHAT CONTENTS   |   TOP OF PAGE   |   HELP

INFORMATIONCONDUCT | THREATS | TECH VULNERABILITYASSISTANCE
SPY STORIES | TREASON 101