Cyber ​​espionage in action

12
Cyber ​​espionage in actionIt would seem that the era of Stirlitz has sunk into oblivion, and those inspired views of domestic spies frowning towards decaying foreign capitalism are no longer there. Moreover, from television screens more and more often they announce to us the failure of Russian agents abroad. Seemingly, only lazy do not detain our “people in black”, and many Western newspapers literally savor episodes of how the Russians are trying to steal foreign secrets using the methods described in the books of thirty years ago. Western journalists are mocking at the fact that spies from Russia are trying to transmit information of interest through radio transmitters or using regular mail. One handed over an envelope with top-secret information right in front of the installed video camera, the other decided, in the literal sense of the word, to bury the information in the ground, so that those who should be dug out. In general, many Russian "declassified" managed to become real stars of Western comics. Records of popularity beats the most famous "secret" agent from Russia, Anna Chapman.

However, the numerous jokes of Western newspapermen somewhat faded after the US counterintelligence department published a very interesting report in early November about the fact that Russia and China literally terrorized the United States with their cyber attacks. It turns out that while “careless” agents “shine” in front of the cameras and defiantly hand over paper bags of information obtained from hands, distracting the attention of Western intelligence services, cyber espionage representatives are doing their job. Russian and Chinese hackers, who systematically gain access to secret technological and economic developments, are spoken not only in the United States. British senior officials confirm the fact that it is from China and Russia that the maximum number of spyware attacks on secret government resources are carried out.

At the same time, neither the Americans nor the British can organize a truly effective opposition to the cyber spies. The fact remains: it is possible to develop the ABM system as much as possible and increase the military contingent, but at the same time remain unprotected from network aggression. Such a concept as cyber espionage acquires a special meaning in the light of the development of information technology. Whatever it was, but it is Russia and China that occupy one of the leading positions in the modernization of software related both to the spread of virus software and the elimination of virus threats. This is evidenced by, perhaps, the most famous Russian programmer Eugene Kaspersky. According to him, one cyber attack on secret information files can cause much more harm than the activities of dozens of spies working with old methods.

A report by American counterintelligence agents indicates that Chinese hackers alone have managed in the past two years to get maximum access to the computer networks of numerous US energy, oil and military industrial companies. At the beginning of last year, the Chinese even managed to kidnap the source code of the Internet giant Google. The Chinese side categorically denies such an accusation and considers this to be the usual misinformation of the world community in order to find a switchman in computer network failures in the United States.

With the proliferation of various types of mobile devices with Internet access, according to Eugene Kaspersky, a huge number of people have the opportunity to become passive distributors of virus codes, which later multiply and use the laptop or the owner’s gadget as a buffer zone for obtaining a certain kind of information. It turns out that cyber spies can use almost any secret information without leaving their own traces, but “substituting” the owner of a mobile phone with Internet access, who was nearby at that moment.

One can imagine how much cyber espionage will achieve if the number of portable Internet devices in 2015 reaches the value of 25 in billions of units, as indicated in the forecasts.

Americans in their report talk about the Chinese program 863, which is designed to hunt for modern technology. It was she, in the opinion of US counterintelligence, that influences the increase of China’s competitiveness. Thanks to this program, the Chinese allegedly put the States at a disadvantage: they themselves, they say, are developing, while others put poles into wheels.

The director of the FBI says that it is China that causes enormous damage to the interests of the United States through the use of cyber-spy technologies. Russia and Iran are also on the list of those whom the Americans have blamed for their troubles in recent years. A sort of cybernetic axis of evil in the American way: China, Iran, Russia.

It turns out that the plots of “Seventeen Moments of the Cybernetic Spring” with their Cyber ​​Stirlitz regularly bring dividends to Russian foreign intelligence. If only Annam Chapman and other "special agents" were distracted well ...
12 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. Lech e-mine
    +1
    12 November 2011 09: 22
    NOT NEW. OLD METHODS AT NEW TECHNOLOGIES.
  2. Anatoly
    +1
    12 November 2011 11: 09
    If the state supported all bright minds and ideas. That wouldn't be a "brain drain". And we have long been able to create an excellent counterbalance to any computer giants. The Russian hacker is not nearly dumber than the American, or the Chinese!
    1. Almor
      0
      14 November 2011 16: 21
      I completely agree, because it is the bright minds that need to be protected and preserved in their country for the benefit of innovations and development of the country ... and we will break these "cheap" pendos more than once ... fellow for our guys it will not rust !!!
  3. ZEBRASH
    +3
    12 November 2011 14: 05
    Well done our hackers fellow Hire a couple of dozen of the best "to work", and let our networks protect, and strangers hack and secret documents can be found. Yes, it is good to pay them for this, so as not to be lured away laughing
    1. vadimus
      +3
      12 November 2011 23: 24
      In Europe, they say that Russian hackers are the best, after China ... But there are 10 times as many Chinese
      1. Sergh
        +1
        13 November 2011 08: 46
        As far as I can, I am watching our youth team of programmers, which rides through contests and for what year in a row takes first places, have even been noted by the government! Well done boys. How many times the Chinese were left in the ass.
        Here you have growing hackers, and on a national scale!
  4. +1
    12 November 2011 17: 32
    But it’s interesting, who knows or heard whether there are hacker centers in Russia in Russia that are engaged in secret development, stealing information. In China, there are such centers that work for the government, but do we have?
  5. +1
    12 November 2011 18: 35
    You can crack what breaks. And in that which breaks, it is best to hide the misinformation.
  6. +1
    12 November 2011 19: 18
    Something they are all about the axis of evil. Well, would they say something about the axis of good. For example, that the most high-profile industrial espionage scandals in the United States are connected with Israeli agents.
  7. +1
    12 November 2011 20: 34
    This may well be nonsense; we are the axis of evil, and they need to get more grandmas for cyber security.
    If we spy on industry so much, where is the result?
    1. Sergh
      +1
      13 November 2011 08: 41
      Yeah, well, right now, personally, Putin will spread the spy results to everyone in apartments in a letter!
      1. 0
        13 November 2011 16: 36
        I'm not talking about results in a letter, I'm talking about results in goods and products
  8. German
    +1
    13 November 2011 20: 36
    and for some reason I remembered the old saying-loudest of all "stop the thief" shouts the thief himself! and Pindos is very advanced in this!
  9. dred
    -1
    27 November 2011 12: 41
    Well, not only they have a cyber military. For example, with us. China. India