When you gaze into the sky, what do you see? If you happen to live in China, the answer might be surveillance drones disguised as birds, according to a new report from the South China Morning Post. The new report alleges that Chinese military and government agencies have been using undercover drones to spy on segments of the population, especially in an area of Western China that borders Russia, Mongolia, and Pakistan, among other countries.
The plan was to hack the hackers. Cybercriminals had targeted a global bank’s customers with phishing emails to break into their accounts. The legal option—waiting for law enforcement to investigate and perhaps apprehend the hackers—would have taken too long. So the bank was willing to try something else, and a team of security consultants offered to strike back.
When “little green men” invaded Crimea in early 2014, they left a data trail that went largely unnoticed by the U.S. Intelligence Community (IC). Distracted by a large Russian exercise to the west, the IC did not connect the digital dots that indicated the impending invasion. In the Information Age, the “dots” are more plentiful and glaring as everyone now leaves a data trail. Given that, how can intelligence analysts better gather, share, organize, and view data to reveal intent, more accurately predict behavior, and make better decisions with limited resources?
Philip Saunders: This is the age of disruption. What we’re witnessing is a shift from territorial monopolies on the use of force as a way of ordering civilization, toward a world of borderless civic networks. Or, in the words of Tom W. Bell, a move from nation states to stateless nations, which extend the dynamics of social networks into areas traditionally monopolized by government.
The message of a new report that was commissioned by the White House says that Broadband internet access is no longer a luxury but a necessity.