{"id":10397,"date":"2016-01-04T11:27:53","date_gmt":"2016-01-04T17:27:53","guid":{"rendered":"http:\/\/hcstx.org\/?p=10397"},"modified":"2016-01-04T11:27:53","modified_gmt":"2016-01-04T17:27:53","slug":"cyber-espionage-the-biggest-dangers-are-the-ones-you-will-never-know-about","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/01\/04\/cyber-espionage-the-biggest-dangers-are-the-ones-you-will-never-know-about\/","title":{"rendered":"Cyber-Espionage: The Biggest Dangers are the Ones You Will Never Know About"},"content":{"rendered":"<div id=\"block-system-main\" class=\"block block-system block-even clearfix\">\n<div class=\"content clearfix\">\n<div id=\"node-1701\" class=\"node node-article node-promoted node-sticky node-odd\">\n<div class=\"content\">\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden clearfix\">\n<div class=\"field-items\">\n<div class=\"field-item even first last\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-10398\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/01\/cyber-espionage-1-1024x346.jpg?w=620\" alt=\"cyber-espionage-1-1024x346\" width=\"620\" height=\"209\" \/><\/p>\n<p>For years, I slept fitfully after a \u201cfriend\u201d told me that it wasn\u2019t the noisy mosquitos buzzing in my ears at night that were a problem.\u00a0 Instead, it was the female mosquitos that made no noise at all but laid eggs in your ears at night.\u00a0 That image wrecked my sleep until the Internet helped me to dispel the myth years later.<\/p>\n<p>The cyber threat is a little like the silent mosquito.\u00a0 The biggest dangers are the ones that you will never know about.<\/p>\n<p>However, if you follow the public discourse on the nature of the cyber threat to the U.S., it seems that the bulk of the dialogue has to do with the issue of hackers and the thousands of daily thwarted attacks against government and private computer systems.\u00a0 It is almost as if the danger is easily detected, and a better password and up-to-date antivirus software can solve the problem.<\/p>\n<p>However, the far bigger threat is from foreign intelligence and terrorist groups, who have the talent, resources, and wherewithal to do serious damage to U.S. interests \u2013 damage we may never realize until it is too late.\u00a0 While we publically frame the problem by citing how many attacks are observed every day, the far bigger problem is hidden.\u00a0 An intelligence organization\u2019s job is to pick your pocket without you ever knowing anything is amiss.\u00a0 You won\u2019t make it very far as an intelligence officer if your adversary becomes aware of your activities.<\/p>\n<p>Of the capable organizations that are determined to do us harm, perhaps the most competent, dedicated, and focused is Russia\u2019s Special Communications Service, the Russian equivalent of the U.S. National Security Agency (NSA).<\/p>\n<p>Russia doesn\u2019t do many things well (dancing bears, perhaps).\u00a0 Spying, however, is a Russian specialty honed by decades of experience controlling its population and stealing from the West.\u00a0 The U.S. has been their main enemy since WWII and remains so today.\u00a0 Indeed, while we more often hear about Chinese cyber activities, the Russian cyber espionage enterprise is far more sophisticated and capable than its Chinese counterpart, according to statements by U.S. intelligence officials.<\/p>\n<p>Unlike in the U.S., the Russian espionage effort is central to its foreign policy, and its offensive cyber capability is a particularly powerful weapon that is used to challenge the U.S. across the board.\u00a0 Indeed, the Russian NSA equivalent is used for \u2013 among other things &#8211; cyber warfare, espionage, counterintelligence, internal control of its citizens, disinformation, and propaganda.\u00a0 Russia\u2019s cyber attacks \u2013 both blatant and stealthy \u2013 are used to achieve geopolitical ends and to maintain an asymmetric ability to damage the U.S.<\/p>\n<p>The Russians have shown a willingness to use the cyber weapons at their disposal, and have done so effectively.\u00a0 In 2007, the Russians swamped Estonian computer systems to express their anger at perceived Estonian disrespect of Russian symbols.\u00a0 A year later, they combined sophisticated cyber intrusions with their military attack against Georgian forces.\u00a0 More recently, they used offensive cyber tools to support their aggressive annexation of Crimea and eastern Ukraine.\u00a0 We even witnessed Russian cyber probing of top U.S. financial institutions in 2013.<\/p>\n<p>Internally, the Russians use cyber weapons to maintain control over their population.\u00a0 By law, all private encryption equipment in Russia is required to be licensed by Russian Intelligence.\u00a0 Likewise, all internet providers in Russia have to install hardware\/equipment provided by the Russian NSA equivalent (and pay for it themselves).\u00a0 There is no such thing as privacy in Russia.<\/p>\n<p>While the U.S. Government is probably the biggest target of Russian cyber spying, you can be confident that they go after anyone and anything that can help them get what they need.\u00a0 They surely steal directly from Yahoo, Google, Facebook, and social media platforms.\u00a0 If they want to collect compromising information on a person in a bank, military unit, national laboratory, or nuclear power plant, you can be sure that they are swimming in e-mail and personal data that can help them craft an approach to that individual.<\/p>\n<p>At the same time, the Russians are collecting the capability to understand and possibly disrupt our power grid, air traffic control, oil and gas infrastructure, and transit networks.\u00a0 Additionally, recent reports cite a significant increase in Russian submarine surveillance activity in the vicinity of the strategic underwater fiber cables that facilitate commercial and classified communications.\u00a0 This aggressive effort has intensified fears of Russian efforts to tap or cut these critical deep sea communication conduits that carry trillions of dollars a day in global business.<\/p>\n<div>\n<p>The only real way to protect ourselves from this kind of sophisticated cyber warfare is a robust public-private partnership between our intelligence and law enforcement services, and those companies that provide the backbone of our computer networks.\u00a0 In this sense, perhaps the most damaging of Edward Snowden\u2019s many traitorous acts was to destroy the trust between the private sector and our security professionals.\u00a0 We are now talking past each other, and the Russians, Chinese, Iranians, and others are having a field day.\u00a0 Until those key relationships and trust is restored, we will remain in a vulnerable state.<\/p>\n<p>So, the next time you hear a story about hackers attacking various computer networks, think of the buzzing mosquito, and remember that there is probably something much more dangerous happening away from public notice.<\/p>\n<p>Read the Original Article at <strong><a href=\"http:\/\/thecipherbrief.com\/article\/cyber-espionage\">Cipher Brief<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"field field-name-field-add-this field-type-addthis field-label-hidden clearfix\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"block-views-article_details-block_1\" class=\"block block-views block-odd clearfix\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>For years, I slept fitfully after a \u201cfriend\u201d told me that it wasn\u2019t the noisy mosquitos buzzing in my ears at night that were a problem.\u00a0 Instead, it was the female mosquitos that made no noise at all but laid eggs in your ears at night.\u00a0 That image wrecked my sleep until the Internet helped&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2805,2122,3140,13,74,883,2908,1814,1725,1189,10],"tags":[3605,2213,2338,1453,3606],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/10397"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=10397"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/10397\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=10397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=10397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=10397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}