Page 9 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 9

James F. Powers Jr.







            Following the 9/11 terrorist attacks on American soil, the US Government transformed
            the existing 1960’s emergency management protocols and created a new methodology for
            thinking like our adversaries—what assets (targets) are critical and likely to influence or
            damage national political objectives and thus cause psychological fear and embarrassment.
            Physical barriers to protect critical infrastructures are not only expensive, but also flawed.
            Never will any public- or private-sector owner of critical infrastructure have sufficient
            resources to protect every designated site. The focus on protection from external physical
            intrusions should now shift to internal cyber protection measures—personnel surety and
            Red Teaming.


            A post-9/11 Approach: Empowered with a plethora of legislation, President George W.
            Bush issued a series of executive orders and directives to frame how America would pro-
            ceed in identifying and protecting America’s critical infrastructures. His vision was clear,
            succinct and unambiguous: Focus not only on potential terrorist attacks, but rather on any
            hazard that might damage, destroy or otherwise incapacitate America’s critical infrastruc-
            tures. The Rationale: regardless of the cause of incapacitation, the consequences will be
            the same.


            Bush’s vision resulted in today’s All-Hazards Approach—terrorist attacks, major disasters,
            and other emergencies. This approach leads planners to consider myriad factors—designat-
            ing and grouping infrastructures by sector, historical analysis of the most-likely scenarios
            impacting infrastructures, emerging intelligence threats, available resources, prioritization
            of infrastructures, ownership (public- and private-sector) of infrastructures, criticality cri-
            teria, stakeholders associated with infrastructures, existing vulnerabilities of infrastruc-
            tures, consequences associated with damage or destruction of infrastructures, available
            resources and overall risk management. The Intent: apply the available resources to the
            most-likely threat.
            The result of this approach produced the US National Infrastructure Protection Plan. The
            current plan (2013) designates 16 sectors; the Information Technology Sector is orchestrat-
            ed by the Department of Homeland Security. For cyber-specific issues, the newly created


                                                                                      9
   4   5   6   7   8   9   10   11   12   13   14