{"id":2223,"date":"2009-01-12T00:00:00","date_gmt":"2009-01-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/01\/12\/cyber-attacks-ranked-3rd-danger-behind-nuclear-war\/"},"modified":"2021-12-30T11:40:54","modified_gmt":"2021-12-30T11:40:54","slug":"cyber-attacks-ranked-3rd-danger-behind-nuclear-war","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/01\/12\/cyber-attacks-ranked-3rd-danger-behind-nuclear-war\/","title":{"rendered":"Cyber attacks ranked 3rd danger behind nuclear war"},"content":{"rendered":"<p>Cyber attacks pose the greatest threat to the United States after nuclear war and weapons of mass destruction &#8211; and they are increasingly hard to prevent, FBI experts say.  &#8220;Other than a nuclear device or some other type of destructive weapon, the threat to our infrastructure, the threat to our intelligence, the threat to our computer network is the most critical threat we face,&#8221; he added.  US experts warn of &#8220;cybergeddon&#8221;, in which an advanced economy &#8211; where almost everything of importance is linked to or controlled by computers &#8211; falls prey to hackers, with catastrophic results.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Michael Balboni, deputy secretary for public safety in New York state, described &#8220;a huge threat out there&#8221; against everything from banking institutions to water systems and dams.<\/p>\n<p>Henry said terrorist groups aim for an online 9\/11, &#8220;inflicting the same kind of damage on our country, on all our countries, on all our networks, as they did in 2001 by flying planes into buildings.&#8221;<\/p>\n<p>Russian hackers allegedly mounted huge assaults on internet networks in Estonia and Georgia last year, while Palestinian sympathisers have orchestrated attacks against hundreds of Israeli websites in the last few days.<\/p>\n<p>Evan Kohlmann, an investigator with Global Terror Alert, based in Washington, said websites and social networking tools already allow underground Islamist leaders and militant organisations to recruit and communicate in safety worldwide.<\/p>\n<p>http:\/\/www.merit.edu\/mail.archives\/netsec\/msg03055.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2223","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2223"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2223\/revisions"}],"predecessor-version":[{"id":4710,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2223\/revisions\/4710"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}