May 19, 2016
-
Joe Franscella
,

The Impact Of Global Threat Assessment

<p>Criminals do not confine themselves to state borders and neither should counter-intelligence agencies. Global threat assessment is a dialogue about the possibilities for and counter-measures against online attacks launched on a global scale. As our lives become more intertwined with technology, the task <a href="http://www.armed-services.senate.gov/imo/media/doc/Clapper_02-09-16.pdf" target="_blank">of global threat assessment is as big a job as ever</a>. Taking stock of threats and opportunities is our best strategy to make sense of the current landscape and prepare for an unpredictable future. Enemies attacking via the web have much to gain via espionage or acts of sabotage. Cyber criminals which operate globally have advantages like low overhead costs and relatively smaller chance of facing international prosecution.</p><p>Global threat assessment examines challenges the government faces in protecting citizens domestically and staying abreast of international concerns, namely terrorism. Enemies who use the Internet as a tool have their vulnerabilities. Using social apps to organize themselves and electronically transferring funds, they allow for new means to track and investigate their activities.</p><p>Malware and ransomware are still victimizing the private sector despite improvements in enterprise security. As employees fall victim to the same social engineered tactics at the office as they do at home, government networks have been attacked by threats invited from within. Informing the public of these realities and how it can affect individuals is part of the bigger conversation about what big data means for everyone.</p><p>The <a href="https://www.anomali.com/blog/how-the-internet-of-things-will-affect-the-role-of-analysts">Internet of Things</a> (IoT) refers to a newer class of web traffic created by objects which collect and transmit data. Web enhanced devices like smartphones, personal health monitors, and intelligent appliances improve our lives, but the tradeoff is increased susceptibility to breaches. Compromises to info from objects in our homes and offices can mean interruptions in services, corruption of data, or grave security breaches. The potential exists for a wired security system or webcam to be used as a spy portal. Global threat assessment makes room for hypothetical questions like, “Could a major corporation be compromised via its vending machines?”</p><p>One aspect global threat assessment is a concern for artificial intelligence (AI). Advanced artificial intelligence is a theoretical machine that can think and reason on a human level. We are growing ever-closer to the reality of general AI systems. Narrow AI systems perform specific functions like recognizing and responding to customer service calls or scanning images for targets like bombs or tumors. Novelty AI programs have had unintended results on a newsworthy scale, such as rude chat bots. With the introduction of artificial general intelligence, a sentient machine, the world could be facing bots able to perform untold acts of theft and terror. Abuse of artificial super-intelligence allows for sophisticated social engineering such as malware which authors convincing phishing attacks. A massive takeover of the network of weak AI systems by super-intelligent ones could be something out of a grim science fiction tale.</p><p>Consider the <a href="https://www.lawfareblog.com/2016-worldwide-threat-assessment-us-intelligence-community" target="_blank">spread of scientific research and knowledge</a>. The global proliferation of information is a threat to some interests. Proprietary information including scientific and medical discoveries is available to foreign hackers. Sharing of medical discoveries is a humanitarian bonus that regrettably cuts into margins of their developers. Sharing or “borrowing” foreign designs and technologies creates a landscape of similar security protocols, which allows criminals to use similar strategies to attack different countries. As more countries develop space programs, the possibility of hacking into devices in orbit increases.</p><p>Considering the potential global impact of sending data across the web will be a greater priority as computerized devices become more and more prevalent. Private enterprises are at the helm of these advances and celebrated by the Department of Justice as <a href="{page_2094}">partners in global threat assessment</a>.</p><p>For more information on new ways to protect your data, download this free white paper today!</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-79cc3352-61a2-44b7-8b7c-6f25d759918c"><span class="hs-cta-node hs-cta-79cc3352-61a2-44b7-8b7c-6f25d759918c" data-hs-drop="true" id="hs-cta-79cc3352-61a2-44b7-8b7c-6f25d759918c" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3458}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=4f082f1c-a704-4df4-a627-a030c2f8e351&amp;placement_guid=79cc3352-61a2-44b7-8b7c-6f25d759918c&amp;portal_id=458120&amp;redirect_url=APefjpGMndxWCgkMHfVlHiI7zam8Ota-0QMMz6SqoQi0pDaKrmpWW7uGBbB9KK29CT_UE8BfooTZYQxW2xly-KEYB_P9_IYhiS7Y1RGKcKG0X7JZN_Q3aqVCYUmK5H3oxmO2jwAScFLEUl3TYb9UiRfYZdJoym_teaZtrPVpvuvC1_4-ytnT9P6QGQvNXZVK6I79Th-W4H89KoYz2kHOiN1vWThTIxvvA2F561jtJ-cFuBJzFJacN_NR4HJZfum7Vzmr3N3GLlJKTorqkZdNIF_9MpeEaUL3HreM01plNyakKoNkaiHjiZg24QALJ5hJHff3oQYwKaEInpSXvwZrErwtKwAnQRRmHw&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2Fthe-impact-of-global-threat-assessment&amp;canon=https%3A%2F%2Fblog.anomali.com%2Fthe-impact-of-global-threat-assessment&amp;pageId=4141745997&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478831861868.1478887113345.180&amp;__hssc=41179005.28.1478887113345&amp;__hsfp=1335165674" id="cta_button_458120_4f082f1c-a704-4df4-a627-a030c2f8e351" style="margin: 20px auto;" target="_blank" title="Download Here">Download Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, '79cc3352-61a2-44b7-8b7c-6f25d759918c', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.