Cyber Terrorism & Piracy

As the analysis reaches deeper behind the notorious terrorist attacks in Paris, it has become clear that terrorism today is a widening series of global alliances often assisted and connected via cyber social media and electronic propaganda. 

Cyberspace is now becoming home to a digital revolution, where different types of computers are the new brainchild of our cognitive culture. 

Just as the mechanisation of agriculture and production took over the muscles and bodies of our workers, so the computer has begun to replace our brains, machinery, and infrastructures.

These new electronic networks leave ‘exhaust’ data of the social activities and commercial transactions of network traders, political, and business collaborators. This data tells us much forensically about what happened with the data’s use.

Electronic data is increasingly becoming an open door to insecurity.

In the early years of cyber we traded off these disadvantages, but for the last decade we have reached the cyber borders where we can assume that security constantly applies and requires a sophisticated and continual audit process. These systems require far more senior management understanding and involvement, and should not be left solely to the technologists.

Until Edward Snowden began leaking classified documents, billions of people relied on a more common type of security called Transport Layer Security or Secure Sockets Layer (SSL) technology to protect the transmission of sensitive data like passwords, financial details, intellectual property and personal information. That technology is familiar to many Web users through the ‘https’ and padlock symbol at the beginning of encrypted web addresses.

Snowden’s leaked NSA documents make it clear that the intelligence agencies are recording high volumes of encrypted Internet traffic and using it for analysis. 

More recently it has become clear to Western Intelligence, even outside the Five Eyes (United States, Canada, UK, Australia and New Zealand), that this also occurs in countries such as Iran, North Korea, South Africa, Russia, China and Saudi Arabia, all of whom store and monitor vast amounts of Internet traffic.

If we look at how aspects of the cyber world have affected law enforcement and police response to cyber-crime the results for many government police forces is not very positive. Indeed, in 2018 only three out of forty-three police forces in England and Wales had a comprehensive plan to deal with cyber-crime, and less than 1% of cyber-crime was investigated. We can look at the history of our seas, which developed, albeit a couple of thousand years ago, in a similar way to the expansion of the Internet and our interaction with it. Just as the oceans and seas were increasingly used for trade and fishing, so too is cyberspace a modern-day platform for commerce and social networking. 

However, criminal activity, such as piracy, quickly proliferated in both areas. Piracy was also used by governments and commercial groups in the fifteenth and sixteenth centuries as part of their own operations. Pirates were covertly employed to attack and commandeer other government’s trading vessels, and the privateering government would simply duck responsibility as they had no visible association with pirates.

Commercial organisations of all types are now enduring an erratic series of cyber-attacks. Recently some have become headline news, with breaches at Sony, the International Monetary Fund, JP Morgan Chase and Symantec. Recent analysis suggests that ninety percent of small and medium businesses in the United States and European Union do not have adequate cyber security protection.

What about the Rest of the World?

China’s electronic cyber capabilities are very well developed and they are more advanced than most in the cyber arena. Indeed, China has further increased its electronic and cyber effectiveness by collaborating with North Korea and Russia, signing a cyber-security agreement with the latter in May 2015 in which the two nations agreed not to launch cyber-attacks against the other. China has also recently attempted a similar agreement with the US.

Russia has also made use of cyber pirates and privateering methods. They have quietly engaged with cyber hackers and criminal groups while simultaneously denying their involvement in the attacks. Russia has also actively revealed its cyber-attack ability in relation to Georgia, the Ukraine, the United States and Estonia.

As the Internet continues to expand and electronic infrastructures become more interconnected, links into the Dark Web, cyber-attacks, and electronic terrorism will also increase, becoming more complex and interdependent. Once again we may draw parallels with piracy (in its earliest form), where the attempts to control it only began with the Treaty of Paris agreement in 1856, almost a thousand years after the act of piracy first became evident.

For terrorists, electronic threats and attacks have distinct advantages over traditional crime and physical war as they can be controlled economically, secretly, and at a distance. Cyber-attacks do not require large financing of weapons and recruits, and the effects can be global, immediate and devastating. 

However, agencies created to combat cyber-crime are evolving in parallel to cyber terrorism, and efforts to safeguard information are rapidly becoming more sophisticated and efficient.

Alfred Rolington is the author of Strategic Intelligence for the 21st Century: The Mosaic Method

You Might Also Read:

Is It Possible To Neutralise Fake News?:

Terrorism, A Sea Change In Tactics:

 

 

« Malware Attacks Drop As Encrypted Attacks Increase
Surge Of Attacks On Banking & Finance Using N Korean Tools »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Security Compass

Security Compass

Security Compass, the Security by Design Company, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.