Tag: cyberspace

Forsyth namechecks Snowden

Wednesday, 14 November, 2018

What if the most dangerous weapon in the world is not a nuke in a backpack but a 17-year-old boy with a brilliant mind, “who can run rings around the most sophisticated security services across the globe, who can manipulate that weaponry and turn it against the superpowers themselves?” That’s the premise of The Fox, the new thriller from Frederick Forsyth. Born in the year of the Munich Agreement, when British, French and Italian leaders agreed to Hitler’s demand for the German annexation of the Sudetenland, Forsyth has grown up in a world that has experienced its share of evil in his 80 years. The latest manifestation, in his latest novel, is the Vozhd, a Russian word meaning “the Boss” or, in the world of crime, “the Godfather”. When Forsyth was 15, the old Vozhd, Joseph Stalin, died. The new Vozhd is Vladimir Vladimirovich Putin and one of his prized assets arrived in Russia in 2013, having fled from Hawaii. Snippet:

“When defector and traitor Edward Snowden flew to Moscow it is believed he carried over one and a half million documents on a memory stick small enough to be inserted before a border check into the human anus. ‘Back in the day’, as the veterans put it, a column of trucks would have been needed, and a convey moving through a gate tends to be noticeable.

So, the computer took over from the human, the archives containing trillions of secrets came to be stored on databases… Matching pace, crime also changed, gravitating from shoplifting through financial embezzlement to today’s computer fraud, which enables more wealth to be stolen than ever before in the history of finance. Thus the modern world gave rise to the concept of computerized hidden wealth but also to the computer hacker. The burglar of cyberspace.”

The Fox


The axis of cyber evil

Thursday, 15 September, 2016 0 Comments

On Monday, Ciaran Martin, the Director-General Cyber at GCHQ, outlined the British approach to cyber security at the Billington Cyber Security Summit in Washington DC. Very topically, he addressed email. Snippet:

“We need to make sure UK Government email is trusted, so we need to stop people spoofing our .gov.uk domain. To do that we’ve set a DMARC policy as a trial to stop emails from the wrong IP sets, or with the wrong key, from being delivered purporting to come from .gov.uk. Well they do get delivered, but they get delivered to us, not the recipient — usually members of the public. And when we first trialled it, whoever was sending 58,000 malicious emails per day from the delightfully named [email protected] isn’t doing it anymore.”

In an increasingly digitized economy, security is a critical currency. When Colin Powell wakes up and finds his hacked emails on the front pages of global media outlets, overall confidence in cyber security is greatly diminished and while his comments on Clinton and Trump might make for great merriment, we should condemn these intrusions because the cyber bell may toll for us one day, too. Just as it has done for the tennis stars Serena and Venus Williams, the gymnast Simone Biles, and the Tour de France winning cyclists Chris Froome and Bradley Wiggins. Because when Ciaran Martin was speaking, the World Anti-Doping Agency was confirming that a Russian cyber espionage group known as Fancy Bear had accessed its Anti-Doping Administration and Management System database. The stolen information is now being broadcast 24/7.

People, businesses and institutions will be reluctant to share information in a digital environment they feel is fundamentally unsafe, and Ciaran Martin accepted this when he said that the internet may have transformed the way we live, “but it hasn’t completely changed our nature fostered over thousands of years. And nor are the groups who pose us harm particularly new.” They are stealing secrets, stealing money, stealing intellectual property, and they are pumping out propaganda that’s crafted to confuse and intimidate. Without naming Russia, China and North Korea specifically, he said:

We’ve got hostile states. Some of them are great powers, using cyber attacks to spy, gain major commercial and economic advantage or to pre-position for destructive attack. Others are smaller states, looking to exploit the relatively immature rules of the road in cyberspace to tweak the nose of those they see as bigger powers in a way they would and could never contemplate by traditional military means.”

Tomorrow, here, we’ll name the most hostile of these states.