Information Warfare: Pentagon Spooked By Corporate Spies

Archives

January 18, 2008: Corporate security officials have been delivering some bad news to the U.S. Department of Defense, and American intelligence agencies. It seems that the Internet criminals are putting more effort, and skill, into seeking out corporate secrets. Why should that trouble the Pentagon? Mainly because many of the corporate secrets sought are all about military technology, and the U.S. government uses the same kind of networks and software, and security tools, that corporations use. Worse, corporate security tends to be better than what's found in government organizations. So if the Black Hats (criminal hackers) are getting into corporate systems, they can burrow into the Pentagon, and other government agencies, as well.

The latest wave of attacks on corporations are targeted. The hackers are going after specific people, who have access to a limited set of valuable information. This is often done with email that appears authentic, but actually contains hidden software that gives the hackers access to the victims PC. Such messages will often be sent to hundreds, or thousands, of people working in a part of the corporation that the data thieves want to plunder. The hidden software is well crafted, and quite capable of keeping itself hidden. This stuff is not invulnerable, but corporate network guardians are appalled at how difficult some of it is to find and remove. Sometimes the targets are a mystery as well. There has been quite a lot of activity directed at health care records, which are being stolen and transmitted to foreign locations. This is either to propagate some illegal drug scam, or seek secret data on new drugs being developed.

From a military point of view, the fear is that these thieves would hire themselves out to a foreign nation, to perform espionage, or allow their hacking techniques and software to be used for military purposes. No one will admit exactly how good the criminal hacking tools and techniques are. But the implication is that it's more powerful than what the military hackers have.

 


Article Archive

Information Warfare: Current 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close