<html><body><div style="color:#000; background-color:#fff; font-family:bookman old style, new york, times, serif;font-size:10pt"><div><!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-CA</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1027"/>
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1"/>
</o:shapelayout></xml><![endif]-->
</div><table class="MsoNormalTable" style="width:468.75pt;mso-cellspacing:0cm;mso-yfti-tbllook:1184;mso-padding-alt:
0cm 0cm 0cm 0cm" border="0" cellpadding="0" cellspacing="0" width="625">
<tbody><tr style="mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes">
<td style="padding:0cm 0cm 0cm 0cm">
<font size="4"><a style="font-weight: bold;" href="http://www.itbusiness.ca/IT/client/en/CDN/News.asp?id=67877"><span style="color: rgb(51, 51, 51); font-family: Trebuchet MS,sans-serif;">Cybercrime
'much bigger than al Qaeda'</span></a></font>
<div class="MsoNormal"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Does that mean that we are at war with cyberterrorists?<br>
<i>6/8/2012 3:16:00 PM<br>
<b>by Antone Gonsalves</b></i></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal"><span style="display:none;mso-hide:all"> </span></div>
<table class="MsoNormalTable" style="width:468.75pt;mso-cellspacing:0cm;mso-yfti-tbllook:1184;mso-padding-alt:
0cm 0cm 0cm 0cm;orphans: 2;widows: 2;-webkit-text-size-adjust: auto;
-webkit-text-stroke-width: 0px;word-spacing:0px" id="Table3" border="0" cellpadding="0" cellspacing="0" width="625">
<tbody><tr style="mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes">
<td style="padding:0cm 0cm 0cm 0cm">
<div style="mso-line-height-alt:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">It is unlikely that Americans will ever again see commercial
jets crashing into skyscrapers, piloted by terrorists. But<a href="http://www.dhs.gov/" target="_blank"><span style="font-family:"Arial","sans-serif";
color:#B03925">Department of Homeland Security</span></a><span class="apple-converted-space"> </span>(DHS) Secretary Janet Napolitano
believes that malicious computer code generated by groups like al Qaeda are
just as big a threat to the security and stability of the nation.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Does that mean that we are at war with cyberterrorists?
Napolitano doesn't go that far -- she uses the term "cybercrime,"
as do a number of cybersecurity experts.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Still, the damage worldwide is headed toward a half-trillion
dollars a year. Napolitano, in a speech May 30 to business leaders and
government officials, said that besides "al Qaeda and al Qaeda-related
groups," cybercrime is, "the greatest threat and actual activity
that we have seen aimed at the west and at the United States. Unfortunately,
it is a growth arena."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">"Our cybersecurity as a country is inextricably linked to
our economic capability," she said. "The systems we use are interdependent,
interconnected and critical to daily life in the United States.
Communication, travel, powering our homes, running our banking systems --
these are all interconnected systems."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Napolitano cited a study by Symantec's Norton that estimated
the cost of cybercrime worldwide at $388 billion -- more than the global
market for heroin, cocaine and marijuana combined, and said, "I think
those are conservative numbers, based on the things that come into DHS."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">But the U.S. is not just on the defensive. Napolitano's speech
came just two days before<span class="apple-converted-space"> </span><i>The
New York Time</i>s, citing anonymous sources in the Obama administration,
reported that<span class="apple-converted-space"> </span><a href="http://www.itbusiness.ca/it/client/en/cdn/News.asp?id=67764" target="_blank"><span style="font-family:"Arial","sans-serif";color:#B03925">the
president had secretly ordered the use of the Stuxnet worm to attack the
computers that run Iran's main nuclear enrichment facilities</span></a>. The
Times reported that this was in collaboration with Israel, and was the
continuation of a program code-named Olympic Games, started under President
George W. Bush. The attack is estimated to have set back the Iranian nuclear
program by as much as two years.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Attacking another nation-state's potential military capability
may sound like an act of war to some. Joel Harding, a former military
intelligence officer and now a communication and public diplomacy information
operations expert and consultant, wrote in a blog post shortly after The
Times' story, "It's official. The United States of America was the first
to use an atomic bomb against an enemy and now the United States is the first
to have acknowledged using a cyber weapon against another country. We are now
certified bad guys to the rest of the world."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">"To whoever leaked the information from the Obama
administration, for whatever purpose, you have now doomed the United States
to a terrible legacy forever," he wrote.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">David Jeffers, writing for<span class="apple-converted-space"> </span><i>PCWorld</i>,
called malware such as Flame "the Internet equivalent of biological
warfare."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">But Harding told CSO he does not think this means the U.S. has
started a cyberwar. "There will never be a pure cyberwar in my
opinion," he said. "There will be operations in cyberspace but they
will always be in support of other actions. By itself warfare in cyberspace
cannot conquer an enemy. The effects will normally be temporary and probably
not physical in nature."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Still, he said the admission taints the U.S. in the eyes of
the rest of the world. "It is a challenge to maintain a high moral
position if we are the first to acknowledge the use of such a weapon,"
he said.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Other security experts also say that "war" is the
wrong term. Bruce Schneier, chief security technology officer at BT and an
author, said that "throughout history, the definition of a 'major war'
has involved casualties in the hundreds of thousands. That means dead
people."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Marc Zwillinger, of the Washington, D.C. law firm ZwillGen and
a specialist in cyber conflict calls them "cyberattacks," and said
he doubts the U.S. was the first nation to use them. "Our government,
government contractors, and ISPs have been pummeled for years," he said.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Whatever the semantics, there is unanimous agreement that the
attacks are doing enormous damage.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">"Cybercrime is a really big deal," Schneier said.
"Much bigger than al Qaeda, which has basically been a fairy scare story
since 9/11."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Zwillinger said: "It's something to take very seriously.
It's not that hard to undermine our economy and cause lasting effects. How
long was the Facebook trading glitch that is being blamed for a lot of
uncertainty and panic in the trading of one stock?"</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">"United States corporations lose billions of dollars in
research to cybercrime and espionage every year," Harding said.
"Now imagine these efforts [aimed at] national security products. Not
only do we lose intellectual property and de facto our investment dollars,
but we may have a national security problem."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Another problem with cyberweapons, as a number of articles
have pointed out since the discovery of the Flame virus in the Middle East
(an espionage tool mainly targeting Iran) and the revelations about Stuxnet,
is that they can boomerang, unlike bullets or bombs. Richard Lardner reports
for The Associated Press that "a cyberweapon that spreads across the
Internet may circle back accidentally to infect computers it was never
supposed to target. It's one of the unusual challenges facing the programmers
who build such weapons, and presidents who must decide when to launch
them." [See also: U.S. companies, government not likely burned by Flame]</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Finally, whether it is cybercrime, cyberattacks or cyberwar,
the U.S. seems woefully unprepared for it at some levels. The Washington
Post's Robert O'Harrow wrote earlier this week of stunning vulnerabilities
U.S. infrastructure. He profiled programmer John Matherly, now 28, who as a
teen developed a search engine he called Shodan, and by 2009 discovered
"an astonishing fact: Uncounted numbers of industrial control computers,
the systems that automate such things as water plants and power grids, were
linked in, and in some cases they were wide open to exploitation by even
moderately talented hackers."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">"Over the past two years, Shodan has gathered data on
nearly 100 million devices, recording their exact locations and the software
systems that run them. 'Expose online devices,' the Web site says. 'Webcams.
Routers. Power Plants. iPhones. Wind Turbines. Refrigerators. VoIP
Phones,'" O'Harrow wrote.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">The story also told of a 22-year-old hacker from somewhere
overseas who was able to hack a Siemens S7 controller and gain control of a
water plant serving 16,000 people in South Houston.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Harding said he doesn't know the status of most critical
infrastructure. But he said he's "certain that many, if not most are not
fully updated, do not have adequate monitoring or protections, have
inadequate contingency plans and are unnecessarily exposed to the Internet,
and are therefore vulnerable."</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">"It is too expensive to unhook completely from the
Internet, but that decision must be accompanied by diligent efforts to
mitigate any vulnerabilities," he said.</span></div>
<div style="line-height:11.25pt"><span style="font-size:9.0pt;font-family:"Trebuchet MS","sans-serif";
color:#333333">Zwillinger said, however, that most nation-states will likely
limit their attacks because they still fear the military might of the U.S.
"While our critical infrastructure is vulnerable, would-be attackers are
hesitant to launch a full scale attack knowing that the U.S. would respond,
'using all instruments of national power,'" Zwillnger said, citing a
line from Securing Cyberspace for the 44th Presidency, a report by the Center
for Strategic and International Studies.</span></div>
</td>
</tr>
</tbody></table>
<div> </div><div><font size="2"><span style="font-family:times, serif;">----------------------------------------------------------------------------------------------</span><br style="font-family:times, serif;"></font><font size="2"><span style="font-family:times, serif;">Matunda Nyanchama, PhD, CISSP; mnyanchama@aganoconsulting.com</span><br style="font-family:times, serif;"><span style="font-family:times, serif;">Agano Consulting Inc.; </span><a rel="nofollow" style="font-family:times, serif;" target="_blank" href="http://www.aganoconsulting.com">www.aganoconsulting.com</a>; </font><font class="Apple-style-span" size="2">Twitter: <a rel="nofollow" target="_blank" href="http://twitter.com/#%21/nmatunda"><span class="yshortcuts" id="lw_1298476732_5" style="color:rgb(54, 99, 136);">nmatunda; </span></a></font><font class="Apple-style-span" size="2"><span style="text-decoration:underline;"></span>Skype: okiambe</font><font
size="2"><span class="Apple-style-span" style="border-collapse:separate;color:rgb(0, 0, 0);font-style:normal;font-variant:normal;font-weight:normal;letter-spacing:normal;line-height:normal;orphans:2;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;font-size:medium;font-family:'Book Antiqua';"><span class="Apple-style-span" style="font-size:11px;font-family:verdana, helvetica, sans-serif;"></span></span><br style="font-family:times, serif;"><span style="font-family:times, serif;">----------------------------------------------------------------------------------------------</span><span style="font-style:italic;font-family:times, serif;"></span><span style="font-family:times, serif;" lang="EN-CA"></span></font></div><style><!--filtered {font-family:"Book Antiqua";panose-1:2 4 6 2 5 3 5 3 3 4;}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Book Antiqua";}p
{margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:"Times New Roman";}filtered {margin:1.0in 1.25in 1.0in 1.25in;}div.Section1 {}--></style><div><span style="font-family:times, serif;"><span style="font-size:10pt;">Be prepared for ICT security failures & know how to respond when they happen! <br>Call: <span style="font-weight:bold;">+1-888-587-1150 </span>or <a rel="nofollow"><span style="font-weight:bold;">info@aganoconsulting.com</span></a><br><span style="font-style:italic;"> </span></span></span><span style="font-family:times, serif;">----------------------------------------------------------------------------------------------</span><span style="font-style:italic;font-family:times, serif;"></span><span style="font-family:times, serif;" lang="EN-CA"></span></div><style>filtered {font-family:"Book Antiqua";}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in 0in 0.0001pt;font-size:11pt;font-family:"Book Antiqua";}p
{margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman";}filtered {margin:1in 1.25in;}div.Section1 {}</style><div><span style="font-family:times, serif;font-size:13px;"><div class="MsoPlainText">"The best revenge is massive success" - Frank Sinatra<span style="font-style:italic;"></span></div></span><span style="font-family:times, serif;">-----------------------------------------------------------------------------------------------</span><br style="font-family:times, serif;"><font style="font-family:times, serif;" size="1">This e-mail, including attachments, may be privileged and may contain confidential or proprietary information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making
a copy. Thank you.</font><br></div></div></body></html>