Government, Cyber Attacks, Terrorism & Piracy

Cyberspace is now becoming home to a digital revolution and just as aircraft completely altered military capability and warfare at the beginning of the twentieth century so cyber is now changing warfare and attacks in the 21st century.  

Computers are the new brainchild of our cognitive culture. Just as the mechanisation of agriculture and production took over the muscles and bodies of our workers, so the computer has begun to replace our brains, machinery, and infrastructures. 

By Alfred Rolington

Electronic data is increasingly becoming an open door to insecurity. In the early years of cyber we traded off these disadvantages, but for the last decade we have reached the cyber borders where we can assume that security constantly applies and requires a sophisticated and continual audit process.

These systems require far more senior management understanding and involvement, and should not be left solely to the technologists.

Until Edward J. Snowden began leaking classified documents, billions of people relied on a more common type of security called Transport Layer Security or Secure Sockets Layer (SSL) technology to protect the transmission of sensitive data like passwords, financial details, intellectual property and personal information. That technology is familiar to many Web users through the ‘https’ and padlock symbol at the beginning of encrypted web addresses. However, Snowden’s leaked NSA documents make it clear that the intelligence agencies are recording high volumes of encrypted Internet traffic and using it for analysis. 

More recently it has become clear to Western Intelligence, even outside the Five Eyes (United States, Canada, UK, Australia and New Zealand), that this also occurs in countries such as Iran, North Korea, South Africa, Russia, China and Saudi Arabia, all of whom store and monitor vast amounts of Internet traffic.

If we look at how aspects of the cyber world have affected law enforcement and police response to cyber-crime the results for many government police forces is not very positive. Indeed, in 2014 only three out of forty-three police forces in England and Wales had a comprehensive plan to deal with cyber-crime, and less than 1% of cyber-crime was investigated. We can look at the history of our seas, which developed, albeit a couple of thousand years ago, in a similar way to the expansion of the Internet and our interaction with it.

Just as the oceans and seas were increasingly used for trade and fishing, so too is cyberspace a modern-day platform for commerce and social networking. 

However, criminal activity, such as piracy, quickly proliferated in both areas. Piracy was also used by governments and commercial groups in the fifteenth and sixteenth centuries as part of their own operations. Pirates were covertly employed to attack and commandeer other government’s trading vessels, and the privateering government would simply duck responsibility as they had no visible association with pirates.

Commercial organisations of all types are now enduring an erratic series of cyber-attacks. Recently, some have become headline news, with breaches at Sony, the International Monetary Fund, JP Morgan Chase and Symantec. Recent analysis suggests that ninety percent of small and medium businesses in the United States and European Union do not have adequate cyber security protection.

Global Effects

China’s electronic cyber capabilities are very well developed and they are more advanced than most in the cyber arena. Indeed, China has further increased its electronic and cyber effectiveness by collaborating with North Korea and Russia, signing a cyber-security agreement with the latter in May 2015 in which the two nations agreed not to launch cyber-attacks against the other. 

Russia has also made use of cyber pirates and privateering methods. They have quietly engaged with cyber hackers and criminal groups while simultaneously denying their involvement in the attacks. Russia has also actively revealed its cyber-attack ability in relation to Georgia, the Ukraine, the United States, and Estonia. As the Internet continues to expand and electronic infrastructures become more interconnected, links into the Dark Web, cyber-attacks, and electronic terrorism will also increase, becoming more complex and interdependent. 

Once again, we may draw parallels with piracy (in its earliest form), where the attempts to control it only began with the Treaty of Paris agreement in 1856, almost a thousand years after the act of piracy first became evident.

For terrorists, electronic threats and attacks have distinct advantages over traditional crime and physical war as they can be controlled economically, secretly, and at a distance. Cyber-attacks do not require large financing of weapons and recruits, and the effects can be global, immediate, and devastating. However, agencies created to combat cyber-crime are evolving in parallel to cyber terrorism, and efforts to safeguard information are rapidly becoming more sophisticated and efficient.

________________

Alfred Rolington: is the author of Strategic Intelligence for the 21st Century: The Mosaic Method. He is currently a Director at Cyber Security Intelligence Ltd, and has over thirty years' experience of analytical publishing and media companies, producing information and intelligence for commerce, law enforcement, the military, and government.

You Might Also Read:

Creating Post-Modern Intelligence (£):

The History Of The Internet And Its Possible Future (£):

 

« New Iranian Ransomware Groups Detected
Ransomware Is On the Rise: How to Prevent Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Ridge Canada Cyber Solutions

Ridge Canada Cyber Solutions

Ridge Canada helps insurance brokers and insurance buyers understand, evaluate, and secure cyber coverage that is tailored to their business.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.