Government, Cyber Attacks, Terrorism & Piracy

Cyberspace is now becoming home to a digital revolution and just as aircraft completely altered military capability and warfare at the beginning of the twentieth century so cyber is now changing warfare and attacks in the 21st century.  

Computers are the new brainchild of our cognitive culture. Just as the mechanisation of agriculture and production took over the muscles and bodies of our workers, so the computer has begun to replace our brains, machinery, and infrastructures. 

By Alfred Rolington

Electronic data is increasingly becoming an open door to insecurity. In the early years of cyber we traded off these disadvantages, but for the last decade we have reached the cyber borders where we can assume that security constantly applies and requires a sophisticated and continual audit process.

These systems require far more senior management understanding and involvement, and should not be left solely to the technologists.

Until Edward J. Snowden began leaking classified documents, billions of people relied on a more common type of security called Transport Layer Security or Secure Sockets Layer (SSL) technology to protect the transmission of sensitive data like passwords, financial details, intellectual property and personal information. That technology is familiar to many Web users through the ‘https’ and padlock symbol at the beginning of encrypted web addresses. However, Snowden’s leaked NSA documents make it clear that the intelligence agencies are recording high volumes of encrypted Internet traffic and using it for analysis. 

More recently it has become clear to Western Intelligence, even outside the Five Eyes (United States, Canada, UK, Australia and New Zealand), that this also occurs in countries such as Iran, North Korea, South Africa, Russia, China and Saudi Arabia, all of whom store and monitor vast amounts of Internet traffic.

If we look at how aspects of the cyber world have affected law enforcement and police response to cyber-crime the results for many government police forces is not very positive. Indeed, in 2014 only three out of forty-three police forces in England and Wales had a comprehensive plan to deal with cyber-crime, and less than 1% of cyber-crime was investigated. We can look at the history of our seas, which developed, albeit a couple of thousand years ago, in a similar way to the expansion of the Internet and our interaction with it.

Just as the oceans and seas were increasingly used for trade and fishing, so too is cyberspace a modern-day platform for commerce and social networking. 

However, criminal activity, such as piracy, quickly proliferated in both areas. Piracy was also used by governments and commercial groups in the fifteenth and sixteenth centuries as part of their own operations. Pirates were covertly employed to attack and commandeer other government’s trading vessels, and the privateering government would simply duck responsibility as they had no visible association with pirates.

Commercial organisations of all types are now enduring an erratic series of cyber-attacks. Recently, some have become headline news, with breaches at Sony, the International Monetary Fund, JP Morgan Chase and Symantec. Recent analysis suggests that ninety percent of small and medium businesses in the United States and European Union do not have adequate cyber security protection.

Global Effects

China’s electronic cyber capabilities are very well developed and they are more advanced than most in the cyber arena. Indeed, China has further increased its electronic and cyber effectiveness by collaborating with North Korea and Russia, signing a cyber-security agreement with the latter in May 2015 in which the two nations agreed not to launch cyber-attacks against the other. 

Russia has also made use of cyber pirates and privateering methods. They have quietly engaged with cyber hackers and criminal groups while simultaneously denying their involvement in the attacks. Russia has also actively revealed its cyber-attack ability in relation to Georgia, the Ukraine, the United States, and Estonia. As the Internet continues to expand and electronic infrastructures become more interconnected, links into the Dark Web, cyber-attacks, and electronic terrorism will also increase, becoming more complex and interdependent. 

Once again, we may draw parallels with piracy (in its earliest form), where the attempts to control it only began with the Treaty of Paris agreement in 1856, almost a thousand years after the act of piracy first became evident.

For terrorists, electronic threats and attacks have distinct advantages over traditional crime and physical war as they can be controlled economically, secretly, and at a distance. Cyber-attacks do not require large financing of weapons and recruits, and the effects can be global, immediate, and devastating. However, agencies created to combat cyber-crime are evolving in parallel to cyber terrorism, and efforts to safeguard information are rapidly becoming more sophisticated and efficient.

________________

Alfred Rolington: is the author of Strategic Intelligence for the 21st Century: The Mosaic Method. He is currently a Director at Cyber Security Intelligence Ltd, and has over thirty years' experience of analytical publishing and media companies, producing information and intelligence for commerce, law enforcement, the military, and government.

You Might Also Read:

Creating Post-Modern Intelligence (£):

The History Of The Internet And Its Possible Future (£):

 

« New Iranian Ransomware Groups Detected
Ransomware Is On the Rise: How to Prevent Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

Netpoleon Group

Netpoleon Group

Netpoleon is a leading provider of integrated security, networking solutions and value added services.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

SecureCo

SecureCo

SecureCo supports some of the most demanding cyber practitioners in the world, offering defense-in-depth cybersecurity to support API protection and data transport assurance.

Common Good Cyber

Common Good Cyber

Common Good Cyber is an initiative to strengthen global cybersecurity by supporting organisations that deliver core cybersecurity services that protect the Internet as a whole.