Friday, 25 November 2005

It's cyber-war! Chinese hackers breach US military defences

What's interesting about this is not the spying implications, nor even the minor revelation that, in these internet security times, several important military installations seem to be readily breachable. These are repeating patterns over centuries. What made me pause to reflect is the traceability. For spies these days the hardest thing is no longer getting in, but covering your tracks afterwards. Electronic information systems, by their nature, log every activity. In the real world evidence can be burned, tracks covered. In the virtual world all is recorded. Even doctored evidence is traceable, insofar as the fact that it was altered is logged. Tricks can be used, but there is still a trace to show that they were used. And if they are traceable, they can also be monitored...
Post a Comment