Sophisticated viruses will be the workhorses of 21st-century spying. But there should be rules
IF ASKED why they spied on the computers of their rivals (and allies), the authors of Regin, a sophisticated computer virus that seems to have been designed by a Western government, would presumably echo the proverbial bank robber, and reply “because that’s where the secrets are”.
As the world has gone digital, spying has, too. Regin is just the latest in a trend that first came to public notice in 2010, when a piece of American and Israeli software called Stuxnet was revealed to have been responsible for sabotaging part of Iran’s nuclear programme. Since then have come Flame, Red October, DarkHotel and others (see article); more surely lurk undiscovered in the world’s networks. But unlike the indiscriminate surveillance revealed by Edward Snowden, these chunks of malware seem, like traditional spying, to be targeted at specific governments or even individuals.
For spies, such digital espionage has advantages over the shoe-leather sort. Computers are stuffed with data that can be copied and beamed around the world in seconds—so much easier than fiddling with microdots or smuggling sensitive documents past guards. The more complicated computer operating systems get, the more riddled they are with unnoticed security holes. Staying safe means plugging them all; an attacker need only keep trying until a single one gives way.
Computer espionage is usefully deniable, too: if programmers are careful it is hard to know who is behind an attack. (There are hints that Regin might be British—not least that one of its modules seems to be called “LEGSPIN”, a cricketing term. British spooks refuse to comment.) And it can be conducted from comfortable armchairs thousands of miles from the target, with no need to put human agents in harm’s way.
But cyber-spying raises two tricky issues.
The Latest on: Computer spying
via Google News
The Latest on: Computer spying
- Computer on Module Market Size 2022: Share and Trend, Growth Strategies with Revenue, future Scope, Analytical Overview and Forecasts Up to 2027on May 23, 2022 at 10:30 pm
The publisher has been monitoring the Computer on Module Market and it is poised to grow by $334.67 mn during 2021-2025, progressing at a CAGR of 5.7% during the forecast period. The report on the ...
- Another Indian Army Officer Leaks Sensitive Information to Alleged Female ISI Spyon May 23, 2022 at 2:03 am
Another officer of the Indian armed forces has been arrested for leaking sensitive information to an unknown woman whom he met on a social media platform.
- Aussie businesses are monitoring employees at home with spyware. Here’s what they can seeon May 22, 2022 at 2:35 pm
Australians who are working from home are warned that it’s very likely they’re being watched, with new research finding that most companies have installed spyware on devices to keep an eye on ...
- Shaun Toub Bridges Israeli-Iranian Relations as a Spy Chaser in 'Tehran'on May 18, 2022 at 12:00 pm
In the Apple TV Plus spy thriller, the veteran actor plays an Iranian Revolutionary Guard officer hunting an Israel agent. For CNET's I'm So Obsessed podcast, he talks about why the show is resonating ...
- Remote IT Management and Monitoring: An Overviewon May 18, 2022 at 11:43 am
Remote IT management monitors all of the organization's IT assets and employees dispersed worldwide. Check out how your small business can benefit from it.
- Bitdefender can now protect your identity along with your computeron May 17, 2022 at 2:02 pm
The antivirus maker and cybersecurity firm Bitdefender has unveiled its new identity theft protection service for consumers in the US. Bitdefender Identity Theft Protection provides users with ...
- LPBW spoiler: Matt Roloff tried to ‘spy on’ Amy and Chris’ wedding from security camerason May 17, 2022 at 11:45 am
During the premiere episode of Season 23 of LPBW, Caryn Chandler leaks that Matt Roloff tried to "spy" on Amy and Chris' wedding.
- How to check to see if someone is spying on your computer, whether it's a PC or a Macon May 16, 2022 at 7:16 am
Take it as a warning sign. Let's say you only have a couple of apps that open when you start up your computer. If a different window briefly appears before flicking out of existence, it could be a ...
- Spy agencies look to standardize use of open source intelligenceon May 12, 2022 at 4:26 pm
Spy agencies are starting to organize around a set of common standards and data for using open source intelligence, but challenges remain.
- Remote Patient Monitoring Is Here, but Are We Ready?on May 12, 2022 at 7:57 am
Although remote patient monitoring (RPM) in the healthcare setting is seeing exciting growth, some practitioners and patients are not realizing the true potential for achieving worldwide wellness.
via Bing News