Preview

Cyber Espionage

Powerful Essays
Open Document
Open Document
3191 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Espionage
ABSTRACT

The aim of this report is to examine the topic of cyber espionage. Incidents and threats of espionage committed using software tools have become frequent headlines in news stories in recent years, thus the existence of cyber espionage is undeniable. This report begins with an introduction of the topic, followed by a literature review. Moving on, two case studies specifically involving the use of Trojans and sniffers to commit espionage will be discussed. The scope of these case studies includes the attack mechanisms used and the countermeasures that could plausibly be adopted, as well as a discussion of each case. 1.0 INTRODUCTION Cyber espionage is the use of software tools to obtain secret or private information about another government or business competitor. According to a study by research firm SANS Institute, cyber espionage is ranked Number 3 on its Top Five Menaces for 2008. Hence cyber espionage is an increasing concern in today’s society. Over the past decade, globalization has led to an increase in espionage activities. As businesses become global and competition intensifies, the tendency to steal information to gain a competitive edge increases. Another explanation for a rise in espionage levels is the growth of computer technologies. Computers have shortened the time spent to steal data as individuals can download information and save it in a few seconds, as opposed to spending hours secretly duplicating documents. Computers are interconnected via the company’s network, which is linked to an internet, thus increasing the points of entry through which hackers can gain access to information. Besides making confidential information easier to steal, the computer has enhanced the theft. A group of Russian hackers who stole US$10 million from the Citibank computer network commented “A computer is a much better tool than a handgun… it would take us a long time to get $10 million with a handgun.” In the remaining sections of our report,

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Globalization has not only had an effect of physical crime, but also a substantial impact on cybercrimes. As we have become ever more reliant on computer based technology in our lives, computer hackers are continuously given new…

    • 1202 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays

Related Topics