We, as individuals, are becoming increasingly dependent on these modern gadgets which can open up our personal lives to hackers.
Click to learn more! |
I’m not referring to a high school kid with a 190 IQ…I’m referring to foreign spy networks and criminal organizations. The FBI estimates that China’s PLA has over 30,000 cyber spies, in addition to 150,000 in their private sector. Russia has similar numbers. America’s cyberspace is also being attacked by clandestine stations in the Middle East and France as well. Our government, intelligence services, and companies dealing with top-secret defense contracts are literally “glass houses”, transparent to our enemies.
An exaggeration? No, because the Chinese already downloaded over 20 terabytes of information from the Department of Defense (DOD), which is about one fifth of all data housed in the Library of Congress. What about Wiki-Leaks and its theft of classified diplomatic cables?
Click to learn more! |
Botnets or linked computers that take directions from unknown sources can shut down targeted systems and make tracking down the overseas perpetrators nearly impossible. They operate in countries with no laws against cyber crimes, such as Africa and Latin America. Any computer can be recruited into a botnet by running a malicious software. Such a “drive-by” download will exploit web browser vulnerabilities or trick you into running a Trojan horse program in an e-mail attachment. The hacker and his/her software ends up controlling your computer and is controlled by the botnet that he/she owns. Many groups of computers known as “zombie” computers are compromised by this software that’s controlled by tech-savvy hackers. These “drive-by” downloads occur by clicking on a seemingly innocuous website. The hackers, known as “botnet herders”, control the compromised computers from remote locations and are experts in computer programming and software creation.
Click to learn more! |
They communicate globally over the Internet via their herd of compromised “zombie” computers. Millions of botnets are regularly formed on the Internet. If they want, they can bring down individual computers or entire networks. Not surprisingly, in 2008, hackers pilfered customer files from the Royal Bank of Scotland and used them to withdraw $9 million from ATM’s throughout the United States…in a half hour’s time!
Unfortunately, in addition to robbing banks, they can penetrate our power plants, steal our latest submarine technology, and invade the Pentagon’s secret communications systems. Our national security infrastructure has already been permeated and the IC only has an inkling of what it doesn’t know. So, it’s time to assume the worst case scenario and react accordingly. How?
- We need a “gathering” of all those in the Intelligence Community who deal with cyber security to form an organization supervised by the CIA's counter-intelligence. Let's call it the Cyber Counterintelligence Group(CCG).
- Botnet owners and other computer-crime perpetrators who compromise national security must be aggressively sought and arrested. Congress should initiate this legislation and make it national law. Of the thousands of Internet crimes in the U.S each year, there were a measly 15 arrests or prosecutions. That must change.
- ISP's must notify its customers when a computer has been tied into a botnet.
- The newly-formed counterintelligence team noted in item 1 above, the CCG, be given complete computer access to all companies and entities that the Dept. of Defense and IC conducts business with. Appropriate action is taken when computers are found to be tied-in to a botnet.
- There are opportunities for the DOD and IC to "make a sows ear into a silk purse" out of this cyber threat. If malicious botnets are uncovered by the CCG, then damaging disinformation (to our enemies) can be purposefully broadcast far, wide, and at the speed of light around the globe.
- Make it written policy that the DOD and IC do not conduct business with companies and organizations hooked-in to botnets.
- If you are responsible for protecting national info from cyber theft, you must keep abreast of the evolving and expanding threat-base.
Click to learn more! |
Further reading:
"Stuxnet trojan worm worries intelligence community"
"Computer hackers worry OSINT researchers"
Robert Morton, Ed., Ed.S. is a member of the Association Of Former Intelligence Officers (AFIO) and writes the online Spy novel series "Corey Pearson, CIA Spymaster in the Caribbean". Contact us on the SECURE CONTACT FORM
No comments:
Post a Comment