Friday, June 11, 2021

The world cries, "I am, I said!"..Is anyone really listening?

In our last post, we noted Vice-president Harris’ comment on the need to confront corruption in Central America, if any order and stability were to be achieved in the struggle to manage, limit and control undocumented immigration into the U.S. The very fact that she had to confront the President of Guatemala on his alleged complicity in whatever forms of corruption, in a public press conference, is not only shocking in itself; it is also an index on the complexity and the range of how corruption is eroding much public confidence, in many quarters.

Cyber hacking of Colonial Pipeline, while interrupted and effectively curtailed, nevertheless demonstrates a clear link between private agents and public states, in that case, likely Russia. However, the incidence of cyber crime has grown so rapidly and seemingly, without much in the way of impediments, cautions, sanctions or push-back.

According to Marija Lazic writing on the website, Legaljobs.io, “Cyber crime statistics 2019 show that the majority (72%) of cybersecurity breaches in 2019 were financially motivated and were instigated by cyber criminals looking for financial gains. However, 26% of cybercrimes were motivated by intentions traced to espionage and other such reasons…..Hackers attack people worldwide roughly everyhalf a minute, This translates to a cybercrime being committed on an average of 2,244 times per day, according to internet security statistics. Smaller organizations (1-250 employees) have the highest targets malicious email rate at 1 in 323…In the last 5 years, over 500 million online gamers have had their data comprised….Cryptomining is the main target area for 90% of remote code execution attacks. Remote code execution attacks have been very prevalent recently, especially with cryptomining becoming so popular. Remote code execution is a system by which an attacker exploits vulnerabilities in web applications, allowing them to run their own code on the applications and giving them controls over their server and system that possesses the weakness….At present, the US has the highest rate of cyber crime, over 23.6% more than any other country, cyber crime statistics suggest.

Andra Saharia, writing in comparitech.com, June 11, 2021, writes this:

With global cybercrime damages predicted to cost up to $10.5 trillion annually by 2025, not getting caught in the landslide is a matter of taking in the right information and acting on it quickly….With the threat ulandscape always changing, it’s important to understand how cyber attacks are evolving and which  security controls and types of training work. There were 137.7 million new malware samples in 2020  (AV-Test),  a slight reduction from the 1244.91 samples in 2019. As of June 2021, there have been 92.45 million new samples, so we may will see a new high before the end of the year. In 2019, 93.6% of malware observed was polymorphic, meaning it has the ability to constantly change its code to evade detection (2020 Webroot Threat Report). Almost 50% of business PCs and 53% of consumer Pcs that got infected once were re-infected within the same year (2021 Webroot Threat Report). A 2007 study found that malicious hackers were previously attacking computers and networks at a rate of one attack every 39 seconds. The Internet Complaint Center’s 2020 report found that there were 465,177 reported incidents that year, which works out at one successful attack every 1.12 seconds. Notable this doesn’t account for attempted attacks or those that went unreported. (University of Maryland)…86.2% of surveyed organizations were affected by a successful cyberattack. (CyberEdge Group 2021 Cyberthreat Defense Report)…Columbia were the hardest-hit country by cyberattacks in 2019, with 93.9% of all surveyed companies being compromised at least once last year (CyberEdge 2021 Cyberthreart Defense Report). Their list of countries by percent of surveyed companies:

China…………………………..91.5%

Germany………………………91.5%

Mexico……………………….90.6%

Spain………………………….89.8%

USA…………………………..89.7%

Saudi Arabia………………….89.4%

Italy…………………………...87.8%

Singapore…………………….85.7%

Canada……………………….85.7%

Brazil……………………….  85.3%

South Africa…………………83.7%

France……………………….82.2%

Turkey………………………82.0%

Australia…………………….81.6%

Japan………………………..80.9%

UK………………………….71.1%

Anyone who thinks this is not a worldwide pandemic of a different character, is likely asleep under a rock. And, anyone who thinks this is not having an impact, not only on those specific targets, but on the state/ondition of the global body politic as well, is also comatose.

This report goes on:

Ransomware infection rates saw a huge increase in 2020, largely due to the increased, importance of online learning and teleworking platforms. US ramsomeware attacks cost an estimated $915 million in 2020 (Emisoft). Almost 200 million ransomeware attacks occurred in the first nine months of 2020 representing a large increase over the previous year. (SonicWall). A ransomeware attack in early 2020 on the New Orleans city government cost the city upwards of $7 million (SC Magazine). In Frbryary 2020, a ransomeware attack cost Denmark-based company ISS upwards of $50 million (GlobalNewswire). Since 2016, a total of 172 ransomeware attacks have cost the US healthcare organizations $21 billion. (Comparitech)….Ransomeware attacks can be extremely costly. For example, an attack involving the NotPetya ransomeware cost shipping firm Maersk more than $200 million. In 2021, the average global cost to remediate a ransomeware attack rose to $1.5 million, more than double the previous year’s average ($761,106) (Sophos The State of Ransomeware 2021). Organizations in India, Austria, and the US are most likely8 to be hit by ransomeware attacks, In India, the prevalence is expecially high with 68% of organizations dealing with ransomeware. Austria has the next highest rate at 57%. (Sophos The State of Ransomeware 2021)…Iran, Algeria and Bangladesh top the list of countries attacked by mobile ransomeware in terms of share of users (Kaspersky Labs). …What makes the ransomeware problem worse is that nation-states are involved. Investigations proved that the WannaCry and NotPetya ransomeware attack campaigns were orchestrated by nation-state actors. They may have started in 2017, but their effect continued into 2020. The objective was to destroy information or cause distractions rather than to derive financial benefits. Datto’s Global State of the Channel Ransomeware Report 2020 shows that ransomeware is still a huge cause for concern for any type of organization, particularly SMBs.

There are concepts, agencies, actors and complications in these reports that previously were never even included in a reasonably comprehensive awareness of the ‘state of the world’ only a few months ago. The capacity of technology both to change and to find its way into the hands of the most nefarious actors, both state and private, and some various hybrids of those two, and then to be deployed for a variety of purposes, both financial profit and political “profit” (disinformation, democratic deconstruction, propaganda victories, electoral transformation, and the perception of election fraud, thereby destabilizing public confidence in those election systems) leaves the world gasping for breath, not to mention co-ordinated and collaborative ways and means to address these new issues.

By comparison, global warming and climate change seem relatively simple both to comprehend and hopefully therefore to fix, naturally with multiple state and private actors compliance. “Technocrime”, however, is a horse of a far different colour. And the complicity of both public/state and private/profit driven actors, all of them seemingly hidden behind veils and vaults and complicity of their political operatives, seemingly immune to legitimate world legal action to contain, and to bring to heel, renders world leaders with another potentially existential threat. Pointing to polluters, like coal-fired generators, or like oil refineries, or like manufacturing plants that require coal for energy….this is relatively  easy when compared with the virtually archeological-criminal investigative processes that are needed to root out cybercrime.

Needless to say, also, the life paths of those most dispossessed, in all countries, will latch onto whatever opportunities present themselves, whether legitimate and in the public interest or not, in order to address immediate personal needs. Whether that means sending your children into the unknown darkness of a trek to the Mexican/American border, or whether that means linking with a state actor in a deliberate social and political engineering project dedicated to undermine successful business operations or governments that support those operations, does not really matter. While the second window requires some basic techno-skills, as opposed to the former, the access to those skills is now so ubiquitous and low-cost, that many have already been drawn into that potentially career sector.

Destabilizing, deconstruction, undermining, subterfuge, deception, denial, lies….these are all the methods of what Chinese writer, Sun Tzu, called in his famous book The Art of War:

“All warfare is based on deception,.Hence when able to attack we must seem unable. When using our forces we must seem inactive. When we are near, we make the enemy believe we are far away. When we are far away we must make the enemy believe we are near.”

“Appear weak when you are strong, and strong when you are weak.”

“If he is superior in strength, evade him.”

“Attack him where he is unprepared. Appear where you are not expected.”

“The general who loses a battle makes few calculations beforehand.”

“There is no instance of a country having benefitted from prolonged warfare.”

“A wise general makes a point of foraging on the enemy. One cartload of the enemy’s provisions is equivalent to twenty of one’s own”

“Supreme excellence consists in breaking the enemy’s resistance without fighting”

It would seem so obvious, not to mention dangerous, that many of the world’s current actors are not only steeped in the Sun Tzu doctrine of war, but are also committed to the fullest engagement in deploying those strategies. When legendary basketball coach, Bobby Knight held coaching clinics (one specifically at the University of Toronto, in 1967), he was not engaged in a propaganda campaign to tutor warriors for either his homeland or the potential warriors of his neighbour, Canada. He was engaged in a process of helping design, display and then teach some physical and mental manoeuvres that would help then coaches to develop more skilled players. Fakes, eye movements, deceptive physical clues…these were the tactics he was illustrating.

Today, however, the game of geopolitics has changed, away from hard iron metal tanks, carriers, fighter-jets and even radar screens. Now we see joy-sticks controlling those giants, leaving human direct engagement in the trash-bin of history, at least in Afghanistan. We are also witnessing an immediate tsunami of technological developments that governments, and therefore courts and universities and colleges are rushing to catch up to even understanding their potential impact.

In the hands of people willing to do anything, literally anything, in order to meet immediate and perceived serious needs, instruments of the new war can and will easily slide into a deep dark web. There is considerable evidence that this has already happened, and will continue unabated into the foreseeable future.

Not only are we, collectively, at least in the west, unprepared for the next few years of cybercrime; we are also unprepared for the next pandemic. We are also unprepared for the next colonization of space, as well as the attempted colonization of the Arctic, both of which will rely on both human and cyber technology. And we seem to be looking through what film-makers call a gauze lens when attempting to do reconnaissance on the horizon of our shared future.

Does anyone think we can take those gauze lenses off our eyes? Does anyone believe that current leaders are being fully transparent with what they know about current and future threats? Does anyone think or believe that current ways of operating, at the state level, will be adequate to face the threats of tomorrow….not a decade away but this year and next?

Turbulence, like desperation, breeds more of its own. In the midst of forces that bode well for the illicit, the criminal, the human and drug traffickers, the propagandists and the dictators and their sycophantic slime, it is not surprising that many are seeking mental health support, social community, and even spiritual comfort of a non-institutional nature and source.

I am I said, was a cry coming from the voice of Neil Diamond back in the 1970’s as an existential plea for recognition of the individual. Today, the whole world, collectively and individually, is uttering that cry.

Is anyone really listening? 

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home