Egypt to issue EGP 6b in floating-rate T-bonds    Egypt signs outsourcing deals with 55 firms to create 70,000 jobs, boost digital exports    Egypt's monthly inflation rises 1.3% in Oct, annual rate eases to 10.1%: CAPMAS    Egypt, Qatar intensify coordination as Gaza crisis worsens    Arabia Developments, ElSewedy join forces to launch industrial zone in New 6th of October City    Egypt, US's Merit explore local production of medical supplies, export expansion    Egypt, WHO discuss joint plans to support crisis-affected health sectors    Government to channel major share of Qatar deal proceeds toward debt reduction: Finance Minister    Germany, Egypt sign €50m debt swap for renewable energy grid connection    400 children with disabilities take part in 'Their Right to Joy' marathon    Egypt's Foreign Minister discusses Gaza, Sudan with Russian counterpart    Russia's Putin appoints new deputy defence minister in security shake-up    UNESCO General Conference elects Egypt's El-Enany, first Arab to lead body    Egypt repatriates 36 smuggled ancient artefacts from the US    Grand Egyptian Museum attracts 18k visitors on first public opening day    'Royalty on the Nile': Grand Ball of Monte-Carlo comes to Cairo    Egypt, Albania discuss expanding healthcare cooperation    VS-FILM Festival for Very Short Films Ignites El Sokhna    Egypt's cultural palaces authority launches nationwide arts and culture events    Egypt launches Red Sea Open to boost tourism, international profile    Qatar to activate Egypt investment package with Matrouh deal in days: Cabinet    Hungary, Egypt strengthen ties as Orbán anticipates Sisi's 2026 visit    Egypt's PM pledges support for Lebanon, condemns Israeli strikes in the south    Omar Hisham Talaat: Media partnership with 'On Sports' key to promoting Egyptian golf tourism    Egypt, Medipha sign MoU to expand pharmaceutical compounding, therapeutic nutrition    Egypt establishes high-level committee, insurance fund to address medical errors    Sisi expands national support fund to include diplomats who died on duty    Madinaty Golf Club to host 104th Egyptian Open    Egypt's PM reviews efforts to remove Nile River encroachments    Al-Sisi: Cairo to host Gaza reconstruction conference in November    Egypt will never relinquish historical Nile water rights, PM says    Al-Sisi, Burhan discuss efforts to end Sudan war, address Nile Dam dispute in Cairo talks    Syria releases preliminary results of first post-Assad parliament vote    Egypt resolves dispute between top African sports bodies ahead of 2027 African Games    Germany among EU's priciest labour markets – official data    Paris Olympic gold '24 medals hit record value    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Russia says it's in sync with US, China, Pakistan on Taliban    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



News outlets target of future cyber conflicts
Published in The Egyptian Gazette on 05 - 02 - 2013

RADIO broadcast jamming, the aerial bombing of radio stations and their transmission antennas and the acts of sabotage against radio infrastructures and newspaper premises were frequent events of World War II and the ensuing Cold War. Engineers had to find out ways to hastily equip new buildings to serve as broadcasting studios and how to camouflage replaced antennas so as to protect them against renewed bombing; and they also learned how to arrange alternative frequencies to outmaneuver jamming operations. The early years of satellite TV broadcasting were mostly safe but that did not last for long, with some such broadcasts becoming target of beam jamming in the 2000s.
In the world of today, the targeting of media and news distribution outlets continues but with a new look that is produced and edited by the technology in use. Such targeting may be effected as part of a larger or an all-out attack as so was the case with Estonia 2007 or specifically against one particular service. In the Estonia 2007 case, the country's government offices, ministries, banks, parliament and media and broadcasting services were all incapacitated in one and the same digital strike.
A smaller-scale cyber-attack would have as a target a certain group of similar facilities such as banks and business corporations. An example of that latter form was the cyber-attack against Gulf oil companies in October last year.
The exclusive targeting of media and news services remains the commonest ‘fashion' of our time, mostly taking one or more of five principal shapes; namely, service denial, data theft, network user access disruption, front-page control and content falsification. My definition apparently excludes such individual offences as illegal access to paid services, identity theft and the manipulation of illegally accessed data for purposes to which the hacker or attackers is not entitled.
The reason for excluding these offences is that law enforcement agencies in almost all countries of the world can track the perpetrators and send them to courts. That is not the case of cross-border digital attacks, as hackers are usually sophisticated and highly professional, disguising their identities and faking the point of origin.
The latest cyber-attack broke out just the other day, targeting this time the micro-blogging service Twitter, a global platform for social networking that involves the instantaneous dissemination of views and information.
Compromising the passwords of some 250,000 of its more than 200 million active users and opening users' info to hackers, the attack was, in the words of Twitter's Information Security Director Bob Lord, sophisticated and similar to ones suffered recently by other American media and technology companies including The New York Times and the Wall Street Journal.
Five days earlier, The New York Times reported that its computer systems had for four months been the target of a cyber-infiltration and that the intruders had gotten away with the passwords for its reporters and other employees (http://v.gd/iduqut).
A computer security firm hired by NYT reportedly tracked the attack to Chinese hackers, a conclusion that was dismissed by Beijing as unprofessional and baseless.
The NYT and Twitter cases dramatise both the tug-of-war game that has been on the go for quite some time between news organisations and hackers and the grim outlook for a future laden with the risks of such organisations turned into fragile target in wars or in less intense conflicts or even in business rivalries.
As it unfolded, the NYT case provided much food for thought, not only for cyber-security circles but also, and even more significantly, for media scholars. Viewed in a broader context, this and other qualitatively similar incidents that have taken place all across the world tend to suggest that less hi-tech-dependent newspapers and news services are less prone to digital intrusions and other forms of cyber-attacks. It is a paradox.
While news organisations and media corporations need internet-based software and applications to update their operations and deliver market-standard or even more advanced services, they do simultaneously face a risk of compromising their data, opening their intranets to potentially harmful and unauthorised access.
But no end purpose of digital intrusions into news organisations looks identifiable other than getting to know how to fully or partially disrupt the discharge of a news service. And here is the source of real menace simply because it is digital attackers who can decide when to attempt to knock a news service out of action given that, as a pattern, they have always been on the watch-out for techniques to outsmart additional security measures initiated by news organisations by way of guarding their systems and networks against previously discovered bugs. Furthermore, tracking the virtual raiders could be both stressful and futile, given that they operate under fake digital profiles and that they keep changing their digital identities.
In the NYT case as well as in many previous cases elsewhere, the security damage was duly assessed and controlled. But it takes money, time and effort which could otherwise have been channeled to some other rewarding ends. Consider, to cite just one example, that the NYT had to stay on digital vigil for four full months so that it could ‘identify every digital back door the hackers used' following which time it had to replace “every compromised computer and set up new defences in hopes of keeping hackers out".
At the heart of the paradox lies the issue of motivation that drives hackers to target news organisations and media corporations. Hackers seek money gains by playing havoc with bank accounts and credit cards. They compromise the national security of states by accessing sensitive information in key departments. They intimidate and degrade the public image of celebs by divulging their very private correspondences, tribulations, romances and affairs.
In the case of news and media organisations, however, the motivations of digital raiders are not only many and varied but also wrapped in some extent of ambiguity or suspicion. Whichever information saved by these organisations is mainly meant for dissemination in print, over terrestrial and satellite frequencies, over broadband services or via SMNs. And most such services deliver their output or are now making it digitally available 24/7.
In other words, the largest portion of the content saved by media organisations is by no means classified except in the case of information gathered for a scoop news story. And even in that latter case, the information would be ultimately made public.
It appears therefore that content theft in news organisation intrusions may not be the grand prix for hackers and attackers. Rather, it is most likely the partial or total disruption of the news production cycle if and when need be.
It is the knocking off of studios and antennas by other means. And it is even more disastrous now that the twin news production and consumption cycles have become an inseparable ingredient of the lives of men and women the world over.


Clic here to read the story from its source.