Sophisticated viruses will be the workhorses of 21st-century spying. But there should be rules
IF ASKED why they spied on the computers of their rivals (and allies), the authors of Regin, a sophisticated computer virus that seems to have been designed by a Western government, would presumably echo the proverbial bank robber, and reply “because that’s where the secrets are”.
As the world has gone digital, spying has, too. Regin is just the latest in a trend that first came to public notice in 2010, when a piece of American and Israeli software called Stuxnet was revealed to have been responsible for sabotaging part of Iran’s nuclear programme. Since then have come Flame, Red October, DarkHotel and others (see article); more surely lurk undiscovered in the world’s networks. But unlike the indiscriminate surveillance revealed by Edward Snowden, these chunks of malware seem, like traditional spying, to be targeted at specific governments or even individuals.
For spies, such digital espionage has advantages over the shoe-leather sort. Computers are stuffed with data that can be copied and beamed around the world in seconds—so much easier than fiddling with microdots or smuggling sensitive documents past guards. The more complicated computer operating systems get, the more riddled they are with unnoticed security holes. Staying safe means plugging them all; an attacker need only keep trying until a single one gives way.
Computer espionage is usefully deniable, too: if programmers are careful it is hard to know who is behind an attack. (There are hints that Regin might be British—not least that one of its modules seems to be called “LEGSPIN”, a cricketing term. British spooks refuse to comment.) And it can be conducted from comfortable armchairs thousands of miles from the target, with no need to put human agents in harm’s way.
But cyber-spying raises two tricky issues.
The Latest on: Computer spying
via Google News
The Latest on: Computer spying
- Home viewing this week: ‘The Spy,’ ‘Booksmart,’ ‘Men in Black: International’on September 6, 2019 at 12:00 pm
Sacha Baron Cohen takes a rare dramatic role in "The Spy" (2019), a new Netflix Original limited series ... Ragnarok," he directed and starred in the bittersweet comic drama "Boy" (2010, not rated).
- Eavesdropping and Spying by Smart TVs and Deviceson September 6, 2019 at 9:58 am
“Smart” TVs do their share of spying as well. See H. Tsukayama ... which is a 10-digit identification tag used by computers to locate specific websites), their MAC addresses (a media access control ...
- TV Guy: Sacha Baron Cohen gets serious in 'The Spy'on September 6, 2019 at 12:05 am
"The Spy" is from Gideon Raff, who created the Israeli series ... In lesser hands, she could have been the boring, keyboard-clicking computer whiz. Instead, comedian Mary Lynn Rajskub turned her into ...
- Mass. man charged with hiding spy-cam in Barnstead bathroom to film nieceon September 5, 2019 at 7:31 pm
BARNSTEAD -- A Massachusetts man was arrested on privacy charges, after Barnstead police say he installed a spy camera in the bathroom of a ... where they confiscated a laptop computer, cell phones ...
- Stream On Demand: Sacha Baron Cohen gets serious for ‘The Spy’on September 5, 2019 at 4:30 pm
Sacha Baron Cohen takes a rare dramatic role in “The Spy” (2019), a new Netflix Original limited ... and starred in the bittersweet comic drama “Boy” (2010, not rated). “Computer Chess” (2013, not ...
- The Northern Spy: stability–no longer Apple’s trademark?on September 5, 2019 at 2:27 pm
Tentatively then, a possible fix. We’ll see after the next sleep cycle. The Spy has too much to do in starting up the school year at TWU to leave his computer sleeping. But that MacBook Pro 2015 model ...
- Computer help: Spam could mean your email account is on the 'Dark Web'on September 5, 2019 at 1:13 pm
Q: I am overwhelmed with spam email of late, and I just got notification from a credit monitoring company (which I signed up for because I was notified that my personal information had been ...
- mHealth Monitoring and Diagnostic Medical Devices Market Analysis and Regional Outlook till 2025on September 5, 2019 at 4:39 am
The term is most commonly used in reference to using mobile communication devices such as mobile phones, tablets, computers and PDAs for health ... healthcare professionals and patients. mHealth ...
- I Spy! How to Tell if Your Boss is Monitoring Your Every Move on Your Computeron September 4, 2019 at 12:32 pm
If you use an employer-issued computer, just know that it's definitely not business as usual. Buzz60's Sean Dowling has more.
- How to check if your boss is monitoring your every keystrokeon September 4, 2019 at 2:00 am
Of the ten "employee monitoring tools" examined, seven offer "keystroke recording," and nine allow the employer to take screenshots of a worker's computer screen. "Once an incognito agent is ...
via Bing News