• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / Synergic Cyber Attacks

Synergic Cyber Attacks

March 28, 2013 by Rachel Ehrenfeld

Two major recent attacks on the Internet give us just a hint of what to expect if/when our economic and financial infrastructures are hit by different attacks at once.

Cyberbunker – not a Chinese – but a Dutch webhosting company generated the largest global distributed denial of service (DDoS) attack on the spam filtering company, Spamhouse.

What is said to be a dispute between Cyberbunker and Spamhouse caused the global disruption of Internet services, which according to the Moscow based Kaspersky Lab, is going to get worse. “Such DDoS attacks may affect regular users as well, with network slowdown or total unavailability of certain Web resources…There may be further disruptions on a larger scale as the attack escalates.”

In different kind of attack was committed by three men just 820 yards offshore Alexandria, Egypt. They were caught cutting the 12,500 miles long South East Asia-Middle East-West Europe 4 (SEA-ME-WE 4) cable that goes from France to Singapore. Internet services were disturbed in Italy, Algeria, Tunisia, Egypt, United Arab Emirates, Saudi Arabia, Sudan, Uganda, Kenya, Tanzania, Malaysia, Thailand, Bangladesh, India, Sri Lanka and Pakistan.

Judging by the ease by which both attacks have been carried out, it is clear that physical and cyber security are wanting, and that preparedness for a combined attack is lacking.  It seems that such an emerging threat is too complex or not yet fully understood, thus leaving us unprepared.

A major obstacle that hinders the development of proper security measures, especially on the cyber front, is the timidity of affected companies to admit they have been attacked. There is also a tendency to minimize the threat; short temporary disruptions are attributed to glitches in the system until a massive attack is undeniable. Such obstructions render ineffective the supposed close monitoring of misuse, or unlawful conduct in financial and economic sectors.

The weapons of this new war are not as easily identifiable as Korean ballistic missiles, or Iranian nuclear powers.

They can be used instantaneously or incrementally over time and be hardly noticed.  Even when sporadic attacks are noticed, analytical methods may fail to recognize the potential of a large-scale attack, or the perpetrators. However, difficulties in establishing identification and lack of cooperation prevents decision makers from developing better detection and prevention systems, or advanced methods to respond to them.

This new economic warfare presents a nascent threat in complex areas that challenge analysis and identification. While at first our streets will not be littered with bodies as with a nuclear attack, a stealth attack on our economic, financial and communication channels, could in short time destroy the U.S. economy and devastate its people. Perhaps it’s time to rethink our mostly Digital dependent economy.

Further Reading: 

What if they pulled the plug?

TD Bank says it was hit by a ‘targeted’ cyber attack, affected online banking

Sensitive information must be kept secret

Services join forces to fight cyber crime

Growing Business Dependence on the Internet, Business Roundtable, 2007 (could have been written today).

Filed Under: ACD/EWI Blog, ACD/EWI Exclusive, Cyber

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.