cyberpeace logo white
DONATE
JOIN US


CyberPeace Foundation is an organization working to create and uphold cyber peace and harmony throughout the globe. It continuously strives towards spreading cyber hygiene and cyber ethics.

The primary initiatives undertaken by us are:
CyberPeace Corps
Cyber Bridge
Charity Bounty
e-Raksha
e-Kawach

It has been found that cybercrimes and threats to women online are rising by the day, so that they are the prime targets of some sensitive crimes like revenge pornography and sextortion. For more details please visit digitalshakti.org

It has been found that cybercrimes and threats to women online are rising by the day, so that they are the prime targets of some sensitive crimes like revenge pornography and sextortion. Reasons causing this are not only economical, but also social and cultural, that prevent women from using the internet and issues like trolling that pop up when one uses it too often. With the development of a more advanced and digital age , it is of paramount importance to break this gender divide and create awareness among internet users, to help curb the threats and problems associated with the internet and its usage, and also pave a path to reap the benefits of these great technological advancements.

SUPPORT US TODAY! : Fundraising for the local community causes World Help received.

We are here to help you at any time all over the world so don’t hesitate to reach us at any moment.

Get in Touch

Locations

India

USA

Africa

+91 82350 58865
[email protected]

The Cloak & Dagger – Spy from the Web

Dec 14, 2021

Shrey Madaan

Research Associate, Cyber Peace Foundation

The act of spying is so closely related to the human nature of greed, personal benefits and even political interest. It is an internationally debated issue whether to believe it is equivalent to military warfare or not. However, the issue has not been completely settled yet. But we can come to a consensus that both activities are dangerous to humankind.[1]

There are many reasons for this but arguably the most important to consider is human nature and how easy it is for people to give in to their temptation. It is one of the easiest methods to obtain industrial secrets, payment information, IP addresses, research data, business plans, military plans and political tactics.

And to maintain a competitive edge over other nations, many organizations indulge in various cyber espionage activities. In recent scenarios, it has reached a different level; organizations, corporations and even individuals often face cyber-attacks from foreign countries.

Cyberspace is no longer the wild wild west; it is now a fully developed environment with a range of laws, a body of governing laws, and institutions to enforce those laws. However, with cyberlaw still being in the nascent stages, we are still far from the point where there are universally recognized acts or rules. Despite all these intense efforts, it has become one of the biggest risks to the safety of businesses and governments alike.

In 2013, a U.S cybersecurity company published a report accusing the Chinese military of espionage to procure trade secrets. Although the Chinese military denied the allegations, the company’s system encountered penetrations and data theft. In response, Mandiant (an American Cybersecurity firm) released numerous reports exposing the cyber-espionage groups and their host countries. [2]

In March 2021, the Indian Computer Emergency Response Team exposed yet another trace of cyber actors linked to China and Pakistan.[3]

In the past seven years, it has grown to be one of the biggest threats to cyber defenders. According to Verizon’s 2020 Cyber Espionage Report, State-affiliated breaches and financial gluttony are the leading motives affecting cyberspace by 85% and 86% respectively. Hackers are now even capable of offering their services by performing the duties of cyber mercenaries by targeting organizations and countries that need hackers or security experts. [4]

This is a crime that translates from traditional politics into a digital one and operates on similar strategies. Thus, extracting valuable information is now done wirelessly with a lot more ease to any adversary whether it is a business rival, terrorist or foreign government. It is not only about secrets stolen but also about losing intellectual property, money, goodwill and quite often customers’ confidence.

Numerous events may have led to the evolution of espionage in cyberspace. The first one, and perhaps the most important, is the global proliferation of well-developed cyber-crime technologies and its increasing ability to spy on virtually any secure computer in any private company or government.

It not only compromises the data of renowned enterprises but preys on most medium and small companies as well. The rate at which businesses are getting hacked or having their security compromised is rising significantly year over year. For one in five enterprises, more than 60 % of businesses go bankrupt. It is a consequence of people’s rising concerns over economic downfalls, recessions, fear of financial insecurity. These factors lead employees to commit fraud, trade-off company’s secrets and execute cyber espionage. [5]

We often consider the digital world as intangible, but that is far from the truth. Cyberspace does have some physical traits despite existing only in 1’s and 0’s. Some cybercrimes are nothing more than money-making schemes, while others manipulate online communications, social multiplicity, racial profiling, and alters the state of human consciousness. The curious part is how these are based on social engineering and are capable of hampering human emotions. Cybercriminals advance their attacks with spear phishing, watering holes, zero-day exploits, etc. to mislead victims who often act out of fear, curiosity or agitation.

However, much of the news coverage about cyber espionage is limited to what we know from the publicized breaches. Perhaps a more interesting story lies below the headlines about cyber espionage’s evolution over time and how the tactics mimic social structures that were prominent in the early history of mankind. Cyber espionage can be perceived as a source of frustration and a reminder that the threat to our digital lives isn’t certainly opaque.

[1] Cyberwar: How Nations Attack Without Bullets Or Bombs

[2]Threat Intelligence Reports

[3] China unit targets Indian telcos, firms in cyber espionage

[4] Cyber Mercenaries: The State Hackers and Power

[5] E-espionage