Today's Editorial

Today's Editorial - 25 May 2023

Dangers that lurk

Source: By NARAIN BATRA: The Statesman

The term cyberspace was coined by William Gibson in his 1984 science fiction work Neuromancer ~ a dark social universe. But America created cyberspace, the Internet, based on its democratic value system ~ free, open, decentralized, distributed, and self-governing.

What if the Internet had been created in China or Russia?Architecture and algorithms would have been very different, geared more toward creating a surveillance society than enhancing democratic values. Unfortunately, its very openness and freedom have become the source of its susceptibilities to surveillance.

Authoritarian nations find the freedom of cyberspace very threatening to their hold on power. While they have built firewalls to protect their societies from free speech and free flow of information, they use cyber weapons to attack others’ critical infrastructure.

most attractive feature of cyberspace is that its entrance threshold is so low that an ingenious self-taught person could create apps and new platforms, and become rich. Or, become a hacker and get into infrastructure, financial or military systems.

Rogue states and well-organized digital terrorist groups use footloose hackers to steal intellectual property, and pry into diplomatic and strategic plans. Most cyber-security attacks are unobtrusive, stealthy, and insidious. There are no rules of the road to protect cyberspace, the domain in which all our activities, military, economic, commercial, political and cultural, are being done now.

Power grids, financial systems, defense networks could be brought down by not only hostile states but also non-state actors acting alone or in collusion with their state governments.

Based on Google’s research findings, the Wall Street Journal wrote, “State-sponsored hackers from China have developed techniques that evade common cybersecurity tools and enable them to burrow into government and business networks and spy on victims for years without detection.”

In 2021, a Chinese espionage group hit tens of thousands Microsoft customers. The 7 May 2021 ransomware attack on Colonial Pipeline, one of America’s largest fuel suppliers, was carried out by a criminal hacking group DarkSide’s affiliate that crippled its computer system and for which it had to pay the ransom in cryptocurrency, 75 Bitcoin, or about $4.4 million, according to media reports.

Cryptocurrency based on Blockchain technology is a possible future for global finance. The US Department of Justice was able to recover 64 bitcoins. In October 2020, a cyber-attack shut down the electrical grid of Mumbai, India’s financial capital, plunging millions into darkness.

The New York Times argued that it was a Chinese cyber-attack as a warning that China could not only fight India in the Himalayas but also in its financial hub. One of America’s most precious assets, intellectual property, is under constant threat.

Chinese hackers have been accessing the designs of some major US weapon systems to modernize the country’s military. Perpetrators conceal their location due to the anonymous nature of the Internet, which makes the attribution of cyber attacks problematic.

But technology is being developed to locate perpetrators.Mandiant, a Google’s computer security company, was able to pinpoint that a unit of the People’s Liberation Army, located in Shanghai, had “systematically stolen hundreds of terabytes of data” from American corporations, organizations and government agencies.

They stole “product blueprints, manufacturing plans, clinical trial results, pricing documents, negotiation strategies and other proprietary information from more than 100 of Mandiant’s clients, predominantly in the United States.” But what can be done with hackers if they originate from Russia, North Korea or China?

The Commission on the Theft of American Intellectual Property, an independent commission, said in its March 2021 report that “IP-intensive industries support more than 45 million US jobs.IP theft costs the US economy hundreds of billions of dollars annually and reduces U.S. companies’ R&D investment and innovation.”

China continues to be the largest origin of IP theft today, a situation that has not changed since the Commission’s first report a decade ago when it said, “Intellectual Property (IP) theft needs to have consequences, with costs sufficiently high that state and corporate behaviour and attitudes that support such theft are fundamentally changed.”

Its most intriguing recommendation included that “companies that experience cyber theft ought to be able to retrieve their electronic files or prevent the exploitation of their stolen information.” And furthermore, the report recommended, “both technology and law must be developed to implement a range of more aggressive measures that identify and penalize illegal intruders into proprietary networks….”

America’s National Security Agency conducts surveillance under the authority of the Foreign Intelligence Surveillance Act. It collects metadata from telephone companies and Internet data from Internet Service Providers. It watches the crossborder data flow. With so much data collected through its surveillance power, the NSA should have known through its Early Awareness System about the DarkSide’s ransom attack before it occurred. One would think that Silicon Valley tech wizards should have developed foolproof encryption to protect the nation’s data.

But they haven’t done so yet. Cyberspace, in the ultimate analysis, is nothing but data. Data is power, as Dartmouth Tuck School’s Dean Matthew Slaughter and David McCormick of Bridge Associates, argued in Foreign Affairs. With 5 G technology and the Internet of Things that would turn everything into a networked object, data would expand exponentially. They say data is “non-rivalrous” in the sense that “it can be used simultaneously and repeatedly by any number of firms or people without being diminished.”

True, but how dangerous is that in practical terms! Just consider: The Pentagon spends hundreds of millions of dollars of American taxpayers’ money in R&D for the development of advanced defense systems, which are nothing but data. If data is “non-rivalrous,” the Pentagon shouldn’t worry when hackers copy the weapon design system based on which China could develop a competitive advanced defense system, saving millions of dollars and years of research and development; and pose a threat to America.

Pfizer and Moderna vaccine patents are “non-rivalrous” data, but they wouldn’t share this with anyone. Cyberspace has been called the fifth domain: land, air, water, space, and now cyberspace, for which the United States established Cyber Command, the Pentagon’s offensive cyber force that was elevated in 2017 to a separate unified military command to strengthen cyberspace operations. America like India and other technologically advanced nations has become a data nation.

Data gives us power, but it creates vulnerabilities of which the DarkSide and Mumbai attacks gave us a foretaste. Who would set the new world order in the digital age? Techno-autocratic nations like China and Russia or the world’s democratic nations, the US, EU, Japan, India and others? There can be no freedom without vigilance.


2521, Hudson Lane Vijay Nagar,
Near GTB Nagar Metro Station, Delhi
Ph.: 97173 80832 | 88605 88805

More Details

Plot No. 48, 1st & 2nd Floor,
Behind Sargam Talkies, Zone 2,
M.P Nagar, Bhopal
Ph.: 75099 75361 | 91798 95361

More Details

111-117, 1st Floor, Veda Building,
Bhawar Kuan Square, Indore
Ph.: 98937 72941 | 0731-497 7441

More Details

A1, 2nd Floor, Mamoor Plaza
Above Airtel Office, 2nd Cross Road, 
5th Block, Koramangala, Bengaluru
Ph.: 76191 66663 | 080-4854 4393

More Details

Ph.: 9289772007

56/4 G. Floor & 32, Old Rajendra Nagar, 
Bada bazaar Road, Near Salwan Public School, 
Gate No.2, Delhi
Ph.: 98112 93743 | 011-4517 0303

More Details

Office No. 42, 2nd Floor, 
OM HEERA PANNA Co-op. Society,
Opp. City International School, Oshiwara,
Jogeshwari (West), Mumbai – 400 102
Ph. 98712 65599 | 882600 2521

More Details

2nd Floor keisamthong Hodam Leirak
Thoudabhabok Machin, 
Imphal West,
Ph.: 96502 45599

More Details

4th Floor, Chinar Heights, 
Near Chinar Colony, Baghat
Dist- Srinagar, J&K- 190005
Ph.: 9871235599

More Details

403-404, Apex Tower,
Lal Kothi, Tonk Road,
Ph.: 82908 00441 | 0141-4052 441

More Details

Above Toyota Showroom,
Exhibition Road, 
Near Gandhi Maidan, Patna
Ph.: 74639 50774 | 0612- 2500 961

More Detail

College More, PTI Building
2nd Floor, Sector - V, Salt Lake
Kolkata, West Bengal 700091
Ph.: 9007709895

More Details

2nd floor, Houses No: 3-6-111/7&6,
Above PUMA Showroom,
Liberty Main Road, Himayatnagar,
Hyderabad – 500 029
Ph. 79960 66663 | 882600 2521

More Details