![]() ![]() In: 2013 International Conference on Adaptive Science and Technology (ICAST), pp. 428–430 (2013)ĭuvenage, P., Solms, S.: The case for cyber counterintelligence. In: International Conference on Cyberspace Technology, pp. 105, 102248 (2020)ĭing, Y., Zhou, X., Liu, J., Lin, F., An, J.: Security in cyberspace: issues, challenges and suggestion. Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X.: Cyber security in the age of covid-19: a timeline and analysis of cyber-crime and cyberat-tacks during the pandemic. Wangen, G.: The role of malware in reported cyber espionage: a review of the impact and mechanism. As a result, it allows the attackers using social engineering as the most effective mean for systems intruding. Our model considers two main aspects: first, the technical aspect driven by the rapid advance of information and communication technologies (ICT), as well as the software engineering level used by cybercriminals to create sophisticated malware second, the human aspect influenced by the power struggle between nations and politicians, also considering the lack of technological knowledge or training in organizations. To understand the aspects involved and the approaches employed, we defined a general model to cover all phases used by cyber espionage. This paper presents a general scheme of cyber espionage process based on a literature review of remarkable cases which generated news about this topic and includes the malware report analysis made by security vendors. Some US allies abuse the access they have been granted to try to clandestinely collect critical information that they can use for their own economic or political advantage.The recent increasing cases released worldwide on espionage require a knowledge systematization study in this area. China and Russia are our most aggressive and capable adversaries using economic espionage.Ĭhina and Russia are not the only perpetrators of espionage against sensitive US economic information and technology. The requirement to move quickly and unabashedly leaves American companies vulnerable as they flock into spy-rich developing nations. ![]() American companies are driven into developing markets by shareholders, growth ambitions, and the desire to beat Wall Street's quarterly earnings expectations. The second CI challenge is tied to the nature of public corporations. CI measures absorb company resources that would otherwise be used for growth. This is in large part because counterintelligence is not a typical corporate function, even for well-trained and well–staffed security professionals.Ĭounterintelligence is a challenge for corporations for two reasons. ![]() The private sector alone lacks the resources and expertise to thwart foreign efforts to steal critical American know-how. Without corrective action that mobilizes the expertise of both the Federal Government and the private sector, the technologies cultivated by American minds and within American universities are at risk of becoming the plunder of competing nations at the expense of long-term U.S. Espionage against the private sector increases the danger to long-term U.S. Their efforts compromise intellectual property, trade secrets, and technological developments that are critical to national security. These adversaries use traditional intelligence tradecraft against vulnerable American companies, and they increasingly view the cyber environment-where nearly all important business and technology information now resides-as a fast, efficient, and safe way to penetrate the foundations of our economy. Today, foreign intelligence services, criminals, and private sector spies are focused on American industry and the private sector. Nazi spies during World War II tried to penetrate the secrets behind our aviation technology, just as Soviet spies in the Cold War targeted our nuclear and other military secrets. They frequently avoid using standing armies, shirk traditional spy circles, and go after the heart of what drives American prosperity and fuels American might. National Insider Threat Task Force (NITTF)Īmerica's adversaries throughout history have routinely taken their competitive efforts beyond the battlefield.Threat Assessments to Disrupt & Defeat the Adversary.Advocating for CI and Security Resources. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |