Cyber Espionage
Over the last several years, cyber espionage has become a major problem that is impacting a variety of organizations. This is because hackers and other groups are actively seeking to exploit vulnerabilities in security networks. Evidence of this can be seen by looking no further than the below tables (which are illustrating the motivations and targets of attacks).
Motivations behind Attacks on Computer Networks
Percentage
Cyber Crime
Hactivism
Cyber Warfare / Espionage
("Cyber Attack Statistics," 2012)
Distribution of Targets
Percentage
Government / Infrastructure / Defense / Law Enforcement / Economic
E Commerce / Sports / Political / News Media
31%
Industry
21%
("Cyber Attack Statistics," 2012)
These figures are showing how cybercrime and espionage are areas that are continually being exploited by hackers. What makes this troubling is the fact that organized groups could target specific infrastructure projects that are vulnerable. When this happens, classified information is stolen that could be used to shut down entire networks and infrastructure. The close relationship between private contractors and governmental entities is only increasing these risks further. ("Cyber Attack Statistics," 2012)
In the case of China, they have been aggressively involved in a number of cyber-attacks against the military, public and civilian targets. One of the most damaging is the case called Titan Rain. To fully understand what is happening there will be a focus on: the different aspects, how it was conducted and an examination as to how the attack could have been prevented. Together, these different elements will highlight the way these issues are a threat to national security and possible strategies for mitigating them.
Background
The threat of cyber espionage is increasing exponentially. This is because technology and coding techniques have improved dramatically. Over the course of time, this has been used as tool by nation states to steal illicit information from military, government and private contractors' computers. Recent evidence of this can be seen with comments from Jonathan Evans (the Direction General of Britain's MI5) who said, "The amount of hostile activity being generated by foreign states in cyberspace is astonishing. We have investigated threats across the Internet; our personnel are discovering industrial-scale processes involving many thousands of people lying behind both state-sponsored cyber espionage and organized cybercrime." Moreover, the Pentagon recently observed in a report that this threat is becoming more challenging (especially since one of the primary countries conducting these activities is China). Commenting about these issues the report observed, "China will continue to be an aggressive and capable collector of sensitive U.S. technological information, including that owned by defense-related companies, and represented a growing and persistent threat to U.S. national security." This is showing how the threat of cyber espionage is increasing exponentially every day. (Blitz, 2012)
The case involving Titan Rain started in 2003. What happens is the Chinese government has formed tens of thousands of cyber militias around the country. This is where the Peoples' Liberation Army (PLA) will seek out part time civilian hackers to identify vulnerabilities in U.S. And European networks. The basic idea is to use these individuals to continually target a number of different security flaws, exploit them and steal classified information undetected. (Witman, 2011)
The way Titan Rain worked was to seek out vulnerabilities using a scanner program that searched for weaknesses inside the Department of Defense (DOD) systems. This was accomplished by identifying single computers that were most vulnerable. After the scan was completed, is when a list of targets was selected and the hackers returned to steal information without being detected. This process was repeated over and over again (by going after any computer that they felt was vulnerable). Over the course of the night and early morning hours, is when these attacks were conducted. This is because the operator would more than likely be off the machine (which allowed hackers several hours to go through the files). Below is a list of a few of the most significant targets attacked on November 21, 2004. (Thornburgh, 2005)
10:23 PM: The U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona.
1:19 AM: Defense Information Systems Agency in Arlington, Virginia.
3:25 AM: Naval Ocean Systems Center (a defense department installation in San Diego, California).
4:46 AM: United States Army Space and Strategic Defense installation in Huntsville, Alabama. (Thornburgh, 2005)
For nearly two years, this group was able to anonymously attack hundreds of DOD computers. This gave them access to select...
Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state
Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence
Abstract Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence
Cyber Security Technology Emerging Technology for Cyber Security Real-World Examples of the use of Emerging Cyber Security Technologies Government Efforts to enhance Cyber security Technologies Benefits and Drawbacks of Government Efforts for new Cyber-security Technologies Conclusion The development of internet and cyberspace represents of the most revolutionary technological advancement of humanity. Fewer countries and sectors are unaffected by the latest advancement of internet technologies. Although, recent technological phenomenon has influenced several areas, however, it
Human Aspects in IT and Cybersecurity An innovation in IT (information Technology) has revolutionized the method organizations store, record and retrieve information. Moreover, a large percentage of business organizations has taken the advantages internet technology to offer their businesses online where customer's data such as credit cards, SSN (social security number), tax information, and other personal information are recorded in the organizational databases. A major benefit that internet technology offers to
Human Aspects in IT and Cybersecurity Outline Government Justification of Informing Private industry to improve or Set up Cyber-security Methods of the Government Interventions Impacts of Government Regulation on National Security Failure to comply to related cyber regulations Meeting the minimum requirements. Exceeding the Minimum Requirements The economic and national security of the United States rely on the effective functioning of the country critical infrastructures. Recently, the U.S. government has issued an executive order to manage the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now