All the latest UK technology news, reviews and analysis


Hacking and intellectual property theft presage the new Cold War

26 Apr 2012
V3 reporter Shaun Nichols

The world is increasingly seeing moves to use IT as a weapon on a number of fronts, from industrial espionage to site defacements. Information and the denial of its access are becoming the newest way to destabilise a nation.

If the writing wasn't already on the wall, it should be now; the 21st century will see its own Cold War waged online. Governments and political factions will replace their guns and bombs with advanced persistent threats (APTs) and distributed denial of service (DDoS) attacks. It's a technological arms race.

The concept of weaponising the internet is nothing new. As far back as 2008, groups in Eastern Europe used DDoS attacks as a means to take down vital web services in rival nations.

Among the most disturbing traits of such attacks is that they can be done with little investment and risk, but can effectively disrupt an entire population. Simply mobilising a large group of end users or finding an individual with access to a sizeable botnet and then providing a target can render entire agencies incapable of functioning within a matter of minutes.

We have seen such a philosophy put into practice in the last year by Anonymous.

The hacktivist group has made headlines for its sophisticated data breaches, but the bread and butter of the movement has been the string of DDoS 'takedowns' carried out by its army of end users running a traffic generating tool known as 'Low Orbit Ion Cannon' or LoIC.

While Anonymous has been able to achieve notable results using at times tens of thousands of systems, the practice could be even more dangerous if put into practice by governments.

End users can also be weaponised as an economic tool. Piracy has been an issue dating back to the birth of commercial software, but the practice now has the potential to cause serious harm on rival nations.

Just last week two Chinese nationals were charged with software piracy and illegally exporting technology from the US to their home country, costing the US firms involved almost $100m in lost revenue.

Regions of Asia and Eastern Europe have long had a reputation as havens for pirated software.

Vendors both online and in real-world marketplaces have been known to sell unlocked and pirated copies of both operating systems and popular applications. In different ways, both criminal groups and government organisations can take advantage of such markets to spread spyware-laced software packages and cause financial losses.

Despite the danger posed by such threats, many government groups and security agencies are focusing on even more sophisticated attacks, particularly, the so-called advanced persistent threat (APT).

First pushed into the public consciousness with the discovery of the Operation Aurora attack, the APT seeks to infiltrate an organisation and steal as much data as possible. Corporate espionage has thus far been the most popular use of APTs.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Shaun Nichols
About

Shaun Nichols is the US correspondent for V3.co.uk. He has been with the company since 2006, originally joining as a news intern at the site's San Francisco offices.

More on Government
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
20%
14%
4%
20%
30%
12%

Popular Threads

Powered by Disqus
Galaxy S5 vs Xperia Z2 home screen

Xperia Z2 vs Galaxy S5

We break down the strengths and weaknesses of the two Android heavyweights

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

Junior Developer Hedge Fund C# WPF .Net - London

Junior Developer C# .Net - Mayfair Hedge Fund Junior...

IT Database Administrator (SQL)

Say hello to big brands & bigger career opportunities...

Magento Developer

Tile Mountain is a one stop online shop for all your...
To send to more than one email address, simply separate each address with a comma.