Skip to main content
Part of complete coverage from

There's nothing virtual about cyber attacks

By Bob Greene, CNN Contributor
October 7, 2012 -- Updated 1410 GMT (2210 HKT)
Bob Greene says as more of our everyday lives become bound to the digital world, we are vulnerable to hackers, cyberattack.
Bob Greene says as more of our everyday lives become bound to the digital world, we are vulnerable to hackers, cyberattack.
STORY HIGHLIGHTS
  • Bob Greene: Six banks apparently were hacked recently, cutting customer access to money
  • He says for many "cyber" is like "virtual"--intangible, not real. More and more, that's not true
  • He says as aspects of our lives bound to digital world, we're vulnerable to cybercrime
  • Greene: Officials agree we're inadequately protected, and cyberattacks are up. It's real

Editor's note: CNN Contributor Bob Greene is a bestselling author whose 25 books include "Late Edition: A Love Story," "Duty: A Father, His Son, and the Man Who Won the War," and "Once Upon a Town: The Miracle of the North Platte Canteen."

(CNN) -- When a group halfway around the world, without setting foot on American soil, can claim responsibility for preventing a man in Wichita, Kansas, or a woman in Shreveport, Louisiana, from gaining online access to his or her own money in the local bank, it would seem to be a pretty big deal. Something to worry about.

That is allegedly what happened in recent weeks, as six big U.S. banks had their websites jammed, one after another, preventing their customers from logging on to their personal or business accounts, and from paying bills online.

The banks affected were Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo and PNC. A hacker group, saying it was based in the Middle East, asserted it was behind the cyberattacks; it remains uncertain whether they, or someone else, carried out the attacks.

Bob Greene
Bob Greene

And, last week, Politico reported:

"White House Press Secretary Jay Carney downplayed a report that Chinese hackers had infiltrated a secure national security network used to control nuclear codes, saying the perpetrators breached an 'unclassified' system.

"There is 'no indication whatsoever that exfiltration of data' occurred, he told reporters. . . Such attacks, he added, 'are not infrequent.'"

Any time the prefix "cyber" appears in front of another word -- cybercrime; cyberterrorism; cyberwarfare -- it can have the effect of making the concept seem slightly less substantial. It's sort of like when the word "virtual" precedes a standard-issue noun: virtual reality is not reality; a virtual store is distinct from a brick-and-mortar operation.

Opinion: Smartphone of the future will be in your brain

But as we live more and more of our lives online, and as basic needs such as electricity, water supply, transportation and communication depend increasingly on digital commands, the distinction is rapidly disappearing. Disrupt the digital world and you disrupt real lives -- you throw daily existence into uncharted territory.

Guarding against smart phone hackers
Hackers hold data for ransom
White House hit by hackers
Gen. Alexander explains mobile threat

After the terrorist attacks of September 11, 2001, we were told that there had been ample warning signs that went unheeded. If there ever is a concerted and darkly effective cyberattack on the United States -- one that robs millions of people of baseline necessities -- we won't be able to say that no one told us this might someday happen. We have been told, for years.

In 1997, according to a report in the New York Times that year, a White House commission found that the U.S. was vulnerable to computer-based attacks "upon crucial industries like electrical power, telecommunications, transportation and significant centers of the economy."

The concern appeared to be shared by people on both sides of the political aisle. At a 2004 Senate subcommittee session, Democratic Sen. Dianne Feinstein of California said: "We don't take cyberterrorism as seriously as we should. A terrorist could theoretically use a computer to open up floodgates of a dam, disrupt the operations of an aircraft control tower or shut down the New York Stock Exchange."

Republican Sen. Jon Kyl of Arizona, at the same hearing, said: "We've seen reports that al Qaeda has explored the possibility of damaging some of our key computer systems, seeking to cripple electric power grids, transportation systems, even financial institutions. Just imagine what chaos would result if a cyberattack were coordinated with a more conventional strike, such as bombing a highly populated area and then tampering with emergency systems to thwart hospitals and first responders caring for wounded civilians."

Opinion: Bias in science holds women back

FBI Director Robert S. Mueller, at a speech in San Francisco earlier this year, said: "State-sponsored hackers are patient and calculating. They have the time, the money and the resources to burrow in, and to wait. They may come and go, conducting reconnaissance and exfiltrating bits of seemingly innocuous information -- information that in the aggregate may be of high value."

The Department of Homeland Security operates programs that include the National Cyber Alert System, the National Cyber Response Coordination Group and a security exercise known as Cyber Storm. Yet with all this, most of us -- as thoroughly as we have come to depend upon digital technology -- don't have much of an idea about how it really works.

If your car won't start, you may feel qualified to pop open the hood and try to figure out how to fix it; if your lights go out, you probably know where the fuse box is. Digital outages are more mysterious; when systems go dead, there is a feeling of low-grade helplessness, but usually the confidence that someone, somewhere, is working to bring them back to life.

Thus, the specter of some future cyberattack is troubling precisely because most of us have little sense of how we would individually combat such an incident. Even the terminology is open to dispute. The other afternoon I reached Internet security expert Bruce Schneier in London, where he was attending a conference. I knew he was skeptical about what he considers the inflation of language surrounding computer-based threats, especially terms like "cyber warfare."

Opinion: Dangerous new world of drones

"War is bombs dropping on you," he told me. "War is tanks in your city. War is not your computer being hacked. In any war, there will be a cyberspace component. Wars are fought on all fronts. And cybercrime -- crime -- happens a lot. But that is not war."

Still, as the New York Times reported from Aspen, Colorado, over the summer:

"The top American military official responsible for defending the United States against cyberattacks said Thursday that there had been a 17-fold increase in computer attacks on American infrastructure between 2009 and 2011, initiated by criminal gangs, hackers and other nations.

"The assessment by Gen. Keith B. Alexander, who heads the National Security Agency and also the newly created United States Cyber Command, appears to be the government's first official acknowledgment of the pace at which America's electricity grids, water supplies, computer and cellphone networks and other infrastructure are coming under attack."

Meanwhile, there's the matter of those six major banks, and the customers who couldn't log on to get to their money.

It may all be cyber, but it's starting to feel kind of real.

Follow us on Twitter @CNNOpinion

Join us on Facebook/CNNOpinion

The opinions expressed in this commentary are solely those of Bob Greene.

ADVERTISEMENT
Part of complete coverage on
April 23, 2014 -- Updated 1641 GMT (0041 HKT)
Robert Hickey says most new housing development is high-end, catering to high-earners.
April 23, 2014 -- Updated 1317 GMT (2117 HKT)
Alexander Motyl says as Russian President Putin snarled at Ukraine, his foreign minister was signing a conciliatory accord with the West. Whatever the game, the accord is a major stand down by Russia
April 23, 2014 -- Updated 1229 GMT (2029 HKT)
Les Abend says at every turn, the stowaway teen defied the odds of discovery and survival. What pilot would have thought to look for a person in the wheel well?
April 22, 2014 -- Updated 2247 GMT (0647 HKT)
Q & A with artist Rachel Sussman on her new book of photographs, "The Oldest Living Things in the World."
April 22, 2014 -- Updated 1958 GMT (0358 HKT)
Martin Blaser says the overuse of antibiotics threatens to deplete our bodies of "good" microbes, leaving us vulnerable to an unstoppable plague--an "antibiotic winter"
April 22, 2014 -- Updated 1737 GMT (0137 HKT)
John Sutter asks: Is it possible to eat meat in modern-day America and consider yourself an environmentalist without being a hypocrite?
April 22, 2014 -- Updated 1538 GMT (2338 HKT)
Sally Kohn notes that Meb Keflezighi rightly was called an American after he won the Boston Marathon, but his status in the U.S. once was questioned
April 22, 2014 -- Updated 1256 GMT (2056 HKT)
Denis Hayes and Scott Denman say on this Earth Day, the dawn of the Solar Age is already upon us and the Atomic Age of nuclear power is in decline
April 21, 2014 -- Updated 2036 GMT (0436 HKT)
Retired Coast Guard officer James Loy says a ship captain bears huge responsibility.
April 21, 2014 -- Updated 1708 GMT (0108 HKT)
Peter Bergen says the latest strikes are part of an aggressive U.S. effort to target militants, including a bomb maker
April 21, 2014 -- Updated 1345 GMT (2145 HKT)
Cynthia Lummis and Peter Welch say 16 agencies carry out national intelligence, and their budgets are top secret. We need to know how they are spending our money.
April 21, 2014 -- Updated 1235 GMT (2035 HKT)
Julian Zelizer says President Obama knows more than anyone that he has much at stake in the midterm elections.
April 22, 2014 -- Updated 1255 GMT (2055 HKT)
Eric Sanderson says if you really want to strike a blow for the environment--and your health--this Earth Day, work to get cars out of cities and create transportation alternatives
April 21, 2014 -- Updated 1408 GMT (2208 HKT)
Bruce Barcott looks at the dramatic differences in marijuana laws in Colorado and Louisiana
April 18, 2014 -- Updated 2047 GMT (0447 HKT)
Jim Bell says NASA's latest discovery supports the notion that habitable worlds are probably common in the galaxy.
April 18, 2014 -- Updated 1817 GMT (0217 HKT)
Jay Parini says even the Gospels skip the actual Resurrection and are sketchy on the appearances that followed.
April 18, 2014 -- Updated 1752 GMT (0152 HKT)
Graham Allison says if an unchecked and emboldened Russia foments conflict in a nation like Latvia, a NATO member, the West would have to defend it.
April 18, 2014 -- Updated 1311 GMT (2111 HKT)
John Sutter: Bad news, guys -- the pangolin we adopted is missing.
April 21, 2014 -- Updated 1825 GMT (0225 HKT)
Ben Wildavsky says we need a better way to determine whether colleges are turning out graduates with superior education and abilities.
April 18, 2014 -- Updated 1026 GMT (1826 HKT)
Charles Maclin, program manager working on the search and recovery of Malaysia Flight 370, explains how it works.
April 18, 2014 -- Updated 1250 GMT (2050 HKT)
Jill Koyama says Michael Bloomberg is right to tackle gun violence, but we need to go beyond piecemeal state legislation.
April 17, 2014 -- Updated 1845 GMT (0245 HKT)
Michael Bloomberg and Shannon Watts say Americans are ready for sensible gun laws, but politicians are cowed by the NRA. Everytown for Gun Safety will prove the NRA is not that powerful.
ADVERTISEMENT