Strategic Intelligence For The 21st Century.

As the analysis reaches deeper behind the recent Paris attacks, it has become clear that terrorism today is a widening series of global alliances often assisted and connected via cyber social media, and electronic propaganda.

Cyberspace is now becoming home to a digital revolution, where different types of computers are the new brainchild of our cognitive culture. Just as the mechanization of agriculture and production took over the muscles and bodies of our workers, so the computer has begun to replace our brains, machinery, and infrastructures.

These new electronic networks leave ‘exhaust’ data of the social activities and commercial transactions of network traders, political, and business collaborators. This data tells us much forensically about what happened with the data’s use.

Electronic data is increasingly becoming an open door to insecurity. In the early years of cyber we traded off these disadvantages, but for the last decade we have reached the cyber borders where we can assume that security constantly applies and requires a sophisticated and continual audit process. These systems require far more senior management understanding and involvement, and should not be left solely to the technologists.

Until Edward J. Snowden began leaking classified documents, billions of people relied on a more common type of security called Transport Layer Security or Secure Sockets Layer (SSL) technology to protect the transmission of sensitive data like passwords, financial details, intellectual property and personal information. That technology is familiar to many Web users through the ‘https’ and padlock symbol at the beginning of encrypted web addresses.

However, Snowden’s leaked NSA documents make it clear that the intelligence agencies are recording high volumes of encrypted Internet traffic and using it for analysis. More recently it has become clear to Western Intelligence – even outside the Five Eyes (United States, Canada, UK, Australia and New Zealand) – that this also occurs in countries such as Iran, North Korea, South Africa, Russia, China and Saudi Arabia,  all of whom store and monitor vast amounts of Internet traffic.

Recent analysis suggests that ninety percent of small and medium businesses in the United States and European Union do not have adequate cyber security protection.

If we look at how aspects of the cyber world have affected law enforcement and police response to cyber crime the results for many government police forces is not very positive. Indeed, in 2014 only three out of forty-three police forces in England and Wales had a comprehensive plan to deal with cyber crime, and less than 1% of cyber crime was investigated.

We can look at the history of our seas, which developed – albeit a couple of thousand years ago – in a similar way to the expansion of the Internet and our interaction with it. Just as the oceans and seas, were increasingly used for trade and fishing, so too is cyberspace a modern-day platform for commerce and social networking. However, criminal activity, such as piracy, quickly proliferated in both areas.

Piracy was also employed by government’s and commerce in the fifteenth and sixteenth centuries as part of their own operations. Pirates were covertly employed to attack and commandeer other government’s trading vessels, and the privateering government would simply duck responsibility as they had no visible association with pirates.

Commercial organisations of all types are now enduring an erratic series of cyber-attacks. Recently some have become headline news, with breaches at Sony, the International Monetary Fund, JP Morgan Chase and Symantec. Recent analysis suggests that ninety percent of small and medium businesses in the United States and European Union do not have adequate cyber security protection.

What about the rest of the world?
China’s electronic cyber capabilities are very well developed and they are more advanced than most in the cyber arena. Indeed, China has further increased its electronic and cyber effectiveness by collaborating with North Korea and Russia, signing a cyber-security agreement with the latter in May 2015 in which the two nations agreed not to launch cyber-attacks against the other. China has also recently attempted a similar agreement with the US.

Russia has also made use of cyber pirates and privateering methods. They have quietly engaged with cyber hackers and criminal groups while simultaneously denying their involvement in the attacks. Russia has also actively revealed its cyber-attack ability in relation to Georgia, the Ukraine, the United States, and Estonia.
As the Internet continues to expand and electronic infrastructures become more interconnected, links into the Dark Web, cyber-attacks, and electronic terrorism will also increase, becoming more complex and interdependent. Once again we may draw parallels with piracy (in its earliest form), where the attempts to control it only began with the Treaty of Paris agreement in 1856, almost a thousand ears after the act of piracy first became evident.

For terrorists, electronic threats and attacks have distinct advantages over traditional crime and physical war as they can be controlled economically, secretly, and at a distance. Cyber-attacks do not require large financing of weapons and recruits, and the effects can be global, immediate, and devastating. However, agencies created to combat cyber crime are evolving in parallel to cyber terrorism, and efforts to safeguard information are rapidly becoming more sophisticated and efficient.

OUP: http://bit.ly/1Q4LdeM

Alfred Rolington is the author of Strategic Intelligence for the 21st Century: The Mosaic Method published by Oxford University Press

« FBI's War On Encryption Is Unnecessary
Energy Utilities Highly Vulnerable To Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Learning Tree International

Learning Tree International

Learning Tree's comprehensive cyber security training curriculum includes specialised IT security training and general cyber security courses for all levels of your organisation including the C-suite.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Superus Careers - Cyber Career Exchange

Superus Careers - Cyber Career Exchange

The Cyber Career Exchange is a specialized recruiting platform focused specifically on cybersecurity.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.

Beazley Security

Beazley Security

Beazley Security is a global cyber security firm committed to helping clients develop true cyber resilience: the ability to withstand and recover from any cyberattack.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).