13/12/2012

How technology shapes espionage

“So, we’re constantly looking and trying to figure out who are the intelligence officers and who are they meeting with? So, covert communications is the way that a spy passes information secretly to the handler, or the handler passes requests and other information back to the spy.  ...

The way information is stored now makes it not only easier to use, but makes it far more vulnerable. If we can penetrate a network, we have everything. We own the kingdom.

So now, where throughout history spies stole the information and technology was used to convey it, it’s now just flipped around. The spy is now often the person that is simply the conveyor of the gadget that penetrates the network, because we now select spies, not by access to the secrets that they personally can get, but the access to the networks. So the person that maintains the network or the person that hypothetically buys the office equipment, such as the printers, could embed a chip into the printer and the printer, when they plug it into the network, now infects the entire network and now you’ve got a virus in the entire network. Now the human is the carrier of technology, as opposed to the technology being the carrier of small bits of information. How information is stores determines how vulnerable it is.”“The digital world has changed everything we know about espionage."

From: http://m.technobuffalo.com/2012/11/26/interview-spy-historian-h-k-melton-explains-how-tech-changed-spying-forever/



SpyWriter Jack King "A new King of thrillers on the horizon" www.SpyWriter.com

No comments:

Post a Comment