Cyber Espionage and Illegitimate Information Retrieval

نویسنده

  • Roland Heickerö
چکیده

One of the most serious threats to a modern country’s trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage there may be individual states and security services as well as competing companies. One trend is that criminal players are getting involved both as thieves and fences of information. Computerisation and the development of the Internet drastically increase the possibility of procuring sensitive information through illegal means. This can be done in different ways. In the paper the convergence between industrialand cyber espionage are discussed. A number of examples are provided of different kinds of espionage as well as some of the methods that is used to collect information over the Internet – such as signals intelligence, monitoring of traffic, penetration and overtaking of computers with the aid of trojans. Examples are given on succesful cybertheft operations such as the operation Buckshot Yankee and the Chinese Ghostnet. The paper ends with a discussion on how to improve information security in organisations in order to reduce the risks for illegitimate information drainage. KEyWoRdS Buckshot Yankee, Cyber Espionage, Echelon, Ghostnet, Information Theft, PRISM, Signal Intelligence, SORM The difference between espionage in the traditional sense and industrial espionage is marginal. Both are conducted in similar ways and with the same methods, although targets may differ. In principle, this is the world of organised theft of information. Most countries and companies look for information on their opponents and competitors. Even friendly nations and companies can be of interest. Using open source information is legal and in no way controversial. It is part of the game. The problem lies in the transition from what is legally acceptable to criminal behaviour. The dividing line can be related to what methods are used, whether ethical guidelines are broken in order to acquire information and whether the measures violate the laws of a country or not. Different nations have different legal systems; an activity can be viewed as criminal in one country, but be legal in another. This paper discuss the development of cyber espionage in a broad sense, examples are given on methods to be used in order to collect information. The paper ends with a short discussion on how to protect an organisation from illegitimate information gathering.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism

The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, typ...

متن کامل

Socio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System

Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other...

متن کامل

Corporate Role in Protecting Consumers from the Risk of Identity Theft

The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce, education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks, which includes but not limited to identity theft, corporate espionage and ...

متن کامل

A Summary of the Special Issue "Cybersecurity and Cryptography"

Nowadays in the cyber world, massive amounts of data are being collected, transmitted, and stored by different organizations and individuals. As an important asset, data must be well protected in storage and during transmission. Data security is a crucial factor to the success of new information technologies and infrastructures, such as Cloud Computing and Big Data. This Special Issue includes ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCWT

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2016