Dutch Intelligence Agency Pinpoints Cyberattacks

Attempts at digital espionage and online political manipulation in Europe are on the rise both in number and in complexity, the Netherlands’ main intelligence agency AIVD said recently in its annual report.

Adding its voice to fears around the world of a rise in covert digital influence and espionage, the Dutch General Intelligence and Security Service said in its 2017 report a growing number of foreign powers are using cyber espionage “to acquire information that they use for geo-political gain.”

It highlighted Russia, which it said is “extremely driven in the covert digital influencing of political decision making processes.” It added that the agency also has seen similar attempts by China.

The intelligence agency, known by its Dutch acronym AIVD, is known for its tracking of online threats. Dutch media reported in January that AIVD hackers penetrated the computers used by a Russian hacking group known as Cozy Bear in mid-2014 and watched them for at least a year, even managing to catch the hackers on camera.

Daily newspaper De Volkskrant and television current affairs show Nieuwsuur said Dutch spies used their access to help oust Cozy Bear from US State Department computers in late 2014. The AIVD declined comment on the reports.

In its annual report, the agency said online spying is also being used to infiltrate European multinationals, research institutes as well as the energy, high-tech and chemicals sectors.

Fifth Domain:

You Might Also Read: 

Spy vs Spy - Cozy Bear Hackers Hacked:

New Dutch Law Would Allow Bulk Surveillance:
 

 

« Blockchain: What Business Executives Need To Know
UK Police Introduce Cyber Security Certification »

Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

Cyber Security Centre - University of Kent

Cyber Security Centre - University of Kent

The centre harnesses expertise across the University to address current and potential cyber security challenges.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Leo Cyber Security

Leo Cyber Security

We creatively architect and execute customized cyber security programs to improve your security posture and protect your intellectual property and business.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

Beauceron Security

Beauceron Security

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.