Logo

American Security Council Foundation

Back to main site

Alan W. Dowd is a Senior Fellow with the American Security Council Foundation, where he writes on the full range of topics relating to national defense, foreign policy and international security. Dowd’s commentaries and essays have appeared in Policy Review, Parameters, Military Officer, The American Legion Magazine, The Journal of Diplomacy and International Relations, The Claremont Review of Books, World Politics Review, The Wall Street Journal Europe, The Jerusalem Post, The Financial Times Deutschland, The Washington Times, The Baltimore Sun, The Washington Examiner, The Detroit News, The Sacramento Bee, The Vancouver Sun, The National Post, The Landing Zone, Current, The World & I, The American Enterprise, Fraser Forum, American Outlook, The American and the online editions of Weekly Standard, National Review and American Interest. Beyond his work in opinion journalism, Dowd has served as an adjunct professor and university lecturer; congressional aide; and administrator, researcher and writer at leading think tanks, including the Hudson Institute, Sagamore Institute and Fraser Institute. An award-winning writer, Dowd has been interviewed by Fox News Channel, Cox News Service, The Washington Times, The National Post, the Australian Broadcasting Corporation and numerous radio programs across North America. In addition, his work has been quoted by and/or reprinted in The Guardian, CBS News, BBC News and the Council on Foreign Relations. Dowd holds degrees from Butler University and Indiana University. Follow him at twitter.com/alanwdowd.

ASCF News

Scott Tilley is a Senior Fellow at the American Security Council Foundation, where he writes the “Technical Power” column, focusing on the societal and national security implications of advanced technology in cybersecurity, space, and foreign relations.

He is an emeritus professor at the Florida Institute of Technology. Previously, he was with the University of California, Riverside, Carnegie Mellon University’s Software Engineering Institute, and IBM. His research and teaching were in the areas of computer science, software & systems engineering, educational technology, the design of communication, and business information systems.

He is president and founder of the Center for Technology & Society, president and co-founder of Big Data Florida, past president of INCOSE Space Coast, and a Space Coast Writers’ Guild Fellow.

He has authored over 150 academic papers and has published 28 books (technical and non-technical), most recently Systems Analysis & Design (Cengage, 2020), SPACE (Anthology Alliance, 2019), and Technical Justice (CTS Press, 2019). He wrote the “Technology Today” column for FLORIDA TODAY from 2010 to 2018.

He is a popular public speaker, having delivered numerous keynote presentations and “Tech Talks” for a general audience. Recent examples include the role of big data in the space program, a four-part series on machine learning, and a four-part series on fake news.

He holds a Ph.D. in computer science from the University of Victoria (1995).

Contact him at stilley@cts.today.

FBI Says Foreign States Hacked Into U.S. COVID-19 Research Centers: Report

Wednesday, April 29, 2020

Categories: ASCF News Emerging Threats Cyber Security

Comments: 0

While most of the COVID-19 threat warnings emerging from the Federal Bureau of Investigations have been regarding scams and fraud, now something a lot more sinister and disturbing has emerged. It has been reported that the FBI has seen evidence of foreign state-sponsored hackers breaking into U.S. COVID-19 research institutions.

FBI confirms “reconnaissance activity and some intrusions” into COVID-19 research centers

The FBI has been urging everyone from kids at home from school to the public at large to be vigilant during the ongoing COVID-19 pandemic. This is in light of hackers and scammers looking to exploit our fear, uncertainty, and doubt regarding the current health crisis and the FBI has warned of a significant spike in such scams.

Now it would appear that the threat stakes have been raised. According to a Reuters report, FBI deputy assistant director, Tonya Ugoretz, has confirmed the Bureau has "seen reconnaissance activity, and some intrusions," into companies and institutions actively researching COVD-19 treatments.

Speaking during an online discussion on April 16, hosted by international think tank the Aspen Institute, Ugoretz warned that organizations that have announced their research efforts publicly "make them a mark for other nation-states that are interested in gleaning details about what exactly they’re doing and maybe even stealing proprietary information that those institutions have."

Taking state-sponsored hacking to a new low

Cyber-criminals, such as the Maze ransomware group, have already made a play for medical facilities associated with COVID-19 vaccine research, such as an attack against Hammersmith Medicines Research in London on March 14. And only this week I reported how security researchers were cautioning hospitals on the frontline of the pandemic fight regarding a new "double extortion" threat from ransomware attackers.

But the kind of threat that the FBI is talking about is at a different level altogether. State-sponsored hackers, which are usually referred to as advanced persistent threat (APT) actors, are known for both their sophisticated attack methodologies and a penchant for cyber-espionage. As the pandemic unfolded across the United States, we have already seen such elite hackers targeting the World Health Organization although without success. Now, as Ugoretz has confirmed, that appears to have changed.

Countries behind the attacks have not been identified publicly

On April 16, coincidentally, the U.S. Departments of State, the Treasury, Homeland Security, and the FBI had published an advisory regarding cyber-threats originating from the Democratic People’s Republic of Korea (DPRK) and announced a $5 million (£4 million) reward for information leading to the identification of the state-sponsored hackers involved.

Speaking at the time, Mark Sangster, vice-president and industry security strategist at eSentire Inc, suggested that the timing of the advisory suggested it could be "in response to something that the intelligence community has identified but cannot release in detail without exposing sources." The FBI deputy assistant director did not identify the facilities that had been hacked, nor specify which countries were thought to be behind the ongoing attacks.

The difficulty in attributing such attacks

Ian Thornton-Trump, CISO at cybersecurity intelligence specialists Cyjax, told me that with any vaccine likely to have a monetary value in the billions of dollars, the search for a COVID-19 cure had become a "high stakes horse race between private industry and state-sponsored efforts with the largest prize cash ever known. There are some nation-states that are very adept at stealing intellectual property, and vaccine research is the hottest property this year." When it comes to naming names, Thornton-Trump admits that "the attribution pendulum is blown by political and partisan opportunism," which makes it hard to be accurate. However, he says, "if I were China, given current U.S. sentiment, then using North Korean sub-contractors to conduct espionage for the grand prize would be a good move."

Neither the FBI nor the Office of the Director of National Intelligence has yet provided any further comment on the matter.

Photo: U.S. COVID-19 research facilities have been targeted by nation-state hackers, FBI saysGETTY

Link: https://www.forbes.com/sites/daveywinder/2020/04/17/fbi-says-foreign-states-hacked-into-us-covid-19-research-centers-report/#73c4a48a3c29

Comments RSS feed for comments on this page

There are no comments yet. Be the first to add a comment by using the form below.