Corporate warfare

Last updated

Corporate warfare is a form of information warfare in which attacks on companies by other companies take place. [1] [2] Such warfare may be part of economic warfare and cyberwarfare; but can involve espionage, 'dirty' PR tactics, or physical theft. [3] The intention is largely to destabilise or sink the value of the opposing company for financial gain, or to steal trade secrets from them.

Contents

In fiction

In the science fiction genre of cyberpunk corporations guard their data and hire individuals to break into computer systems of their competitors. [4] In the genre pioneered by William Gibson, power is largely in the hands of megacorporations which often maintain their own private armies and security forces and wage corporate warfare against each other. [5]

Cyber

According to Schwartau, companies are typically targeted by their competitors. Such warfare may include methods of industrial espionage, spreading disinformation, leaking confidential information and damaging a company's information systems. [3]

Chris Rouland of the cybersecurity & cyberarms company Endgame, Inc. controversially advocated that private companies should be allowed to "hack back" against nations or criminals trying to steal their data. [6] After a wave of high-profile attacks against US companies and government databases a panel of experts assembled by the George Washington University Center for Cyber and Homeland Security said policies should be eased to allow "active defense" measures to deter hackers and did not recommend hacking back "because [they] don't want the cure to be worse than the disease". [7] Relevantly on the February 2017 RSA Conference Microsoft President Brad Smith stated that technology companies need to preserve trust and stability online by pledging neutrality in cyber conflict. [8] [9]

The dramatic increase in the use of the Internet for business purposes has exposed private entities to greater risks for cyber-attacks. Garcia and Horowitz propose a game theoretic approach which considers economic motivations for investment in Internet security and investigate a scenario in which firms plan for long-term security investment by considering the likelihood of cyber-attacks. [3]

Botnets may be used to knock business competitors off line. [10] They can be hired by corporations to disrupt the operation of competitors on the networks. [11]

Low-grade corporate warfare is constantly being waged between technology giants by "patent trolls, insider blogs and corporate talking points". [12]

Supply chain attacks in corporate warfare can be called supply chain interdiction. [13]

The term may also refer to the privatization of warfare mainly by the involvement of private military companies. [14] [15] [16]

It has been speculated that the concept of "non-international armed conflict within the meaning of Article 3 GC I to IV" of the Fourth Geneva Convention would be wide enough to allow for covering "a renaissance of corporate warfare". [2]

Art

In 2016 a digital illustration series by the German Foreal design studio called "Corporate Warfare" visualized the power and impact of big brand corporations by branded torpedoes and atomic bombs. Dirk Schuster, cofounder of Foreal states that "big corporations can have more power than governments, so we put them in a military context". [17] [18]

Sam Esmail, creator of the television series Mr. Robot , states that "the next world war won't be fought with nukes, but with information, economics and corporate warfare. [19]

See also

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cyber security, digital security or information technology security is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Industrial espionage</span> Use of espionage for commercial purposes rather than security

Industrial espionage, economic espionage, corporate spying, or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

<span class="mw-page-title-main">Citizen Lab</span> Digital research center at the University of Toronto

The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs at the University of Toronto, Canada. It was founded by Ronald Deibert in 2001. The laboratory studies information controls that impact the openness and security of the Internet and that pose threats to human rights. The organization uses a "mixed methods" approach which combines computer-generated interrogation, data mining, and analysis with intensive field research, qualitative social science, and legal and policy analysis methods. The organization has played a major role in providing technical support to journalists investigating the use of Pegasus spyware on journalists, politicians and human rights advocates.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, programming scripts can all be forms of internet terrorism. Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

<span class="mw-page-title-main">Cyberwarfare</span> Use of digital attacks against a nation

Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.

<span class="mw-page-title-main">Ivanti</span> American IT software company

Ivanti is an IT software company headquartered in South Jordan, Utah, United States. It produces software for IT Security, IT Service Management, IT Asset Management, Unified Endpoint Management, Identity Management and supply chain management. It was formed in January 2017 with the merger of LANDESK and HEAT Software, and later acquired Cherwell Software.

Proactive cyber defence, means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defence can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptively or in self-defence.

A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.

<span class="mw-page-title-main">Kaspersky Lab</span> Russian multinational cybersecurity and anti-virus provider

Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky, and Alexey De-Monderik; Eugene Kaspersky is currently the CEO. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.

Cyber spying, cyber espionage, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware. Cyber espionage can be used to target various actors- individuals, competitors, rivals, groups, governments, and others- in order to obtain personal, economic, political or military advantages. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.

<span class="mw-page-title-main">Chinese espionage in the United States</span>

The United States has often accused the government of China of attempting unlawfully to acquire U.S. military technology and classified information as well as trade secrets of U.S. companies in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology, including espionage, exploitation of commercial entities, and a network of scientific, academic and business contacts. Prominent espionage cases include Larry Wu-tai Chin, Katrina Leung, Gwo-Bao Min, Chi Mak and Peter Lee. The Ministry of State Security (MSS) maintains a bureau dedicated to espionage against the United States, the United States Bureau.

Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and power projection thanks to comparatively advanced technology and a large military budget. Cyber warfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.

Cyberwarfare by China is the aggregate of all combative activities in the cyberspace which are taken by organs of the People's Republic of China, including affiliated advanced persistent threat groups, against other countries.

<span class="mw-page-title-main">Military-digital complex</span> Link between militaries and cyberwarfare

The military-digital complex (MDC) is the militarization of cyber operations by governments and corporations, often through monetary relationships between computer programmers in private companies and the military to combat the threat of cyber terrorism and warfare. Cyber operations since 2000 have increased dramatically, with the recent branch of the US Strategic Command the United States Cyber Command. Cyber operations has been defined by the Washington Post as,

<span class="mw-page-title-main">Cyberattack</span> Attack on a computer system

A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack (DDoS).

<span class="mw-page-title-main">PLA Unit 61398</span> Chinese advanced persistent threat unit

PLA Unit 61398 is the Military Unit Cover Designator (MUCD) of a People's Liberation Army advanced persistent threat unit that has been alleged to be a source of Chinese computer hacking attacks. The unit is stationed in Pudong, Shanghai.

The following outline is provided as an overview of and topical guide to computer security:

<span class="mw-page-title-main">Russian–Ukrainian cyberwarfare</span> Informatic component of the confrontation between Russia and Ukraine

Cyberwarfare is a component of the confrontation between Russia and Ukraine since the collapse of the Soviet Union in 1991. While the first attacks on information systems of private enterprises and state institutions of Ukraine were recorded during mass protests in 2013, Russian cyberweapon Uroburos had been around since 2005. Russian cyberwarfare continued with the 2015 Ukraine power grid hack at Christmas 2015 and again in 2016, paralysis of the State Treasury of Ukraine in December 2016, a Mass hacker supply-chain attack in June 2017 and attacks on Ukrainian government websites in January 2022.

Cybersecurity in popular culture examines the various ways in which the themes and concepts related to cybersecurity have been portrayed and explored in different forms of popular culture, such as music, movies, television shows, and literature. As the digital age continues to expand and the importance of protecting computer systems, networks, and digital information grows, the awareness and understanding of cybersecurity have increasingly become a part of mainstream culture. Popular culture often portraits the gloomy underworld of cybersecurity, where unconventional tactics are used to combat a diverse range of threats to individuals, businesses, and governments. The integration of dark and mysterious elements into cybersecurity stories helps create a sense of uncertainty, rule-breaking, and intriguing ambiguity. This captures the public's attention and highlights the high stakes involved in the ongoing struggle to protect our digital world. This article highlights the creative works and cultural phenomena that have brought cybersecurity issues to the forefront, reflecting society's evolving relationship with technology, privacy, and digital security.

References

  1. Kutais, B. G. (1999). Internet Policies and Issues. Nova Publishers. ISBN   9781590332269 . Retrieved 23 January 2017.
  2. 1 2 Melzer, Nils (29 May 2008). Targeted Killing in International Law. OUP Oxford. ISBN   9780199533169 . Retrieved 23 January 2017.
  3. 1 2 3 Merrick, Kathryn; Hardhienata, Medria; Shafi, Kamran; Hu, Jiankun (22 July 2016). "A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios". Future Internet. 8 (3): 34. doi: 10.3390/fi8030034 .
  4. "The Politics of Cyberpunk". The Cyberpunk Project. Retrieved 23 January 2017.
  5. Meehan, Paul (13 August 2015). Tech-Noir: The Fusion of Science Fiction and Film Noir. McFarland. ISBN   9781476609737 . Retrieved 23 January 2017.
  6. "This Silicon Valley venture fund keeps betting millions on D.C.'s cyber community". Washington Post. Retrieved 23 January 2017.
  7. "U.S. Should Strike Back at Cyberattackers: Report". www.securityweek.com. Retrieved 23 January 2017.
  8. "'Digital Geneva Convention' needed to deter nation-state hacking: Microsoft president". Reuters. 14 February 2017. Retrieved 20 February 2017.
  9. Kaspersky, Eugene. "A Digital Geneva Convention? A Great Idea". Forbes. Retrieved 20 February 2017.
  10. Farwell, James P.; Rohozinski, Rafal. "Stuxnet and the Future of Cyber War" (PDF). Retrieved 23 January 2017.{{cite journal}}: Cite journal requires |journal= (help)[ permanent dead link ]
  11. "DDoS for hire services offering to 'take down your competitor's web sites' going mainstream". webroot.com. 6 June 2012. Retrieved 20 July 2017.
  12. Torrenzano, Richard; Davis, Mark (25 October 2011). Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks. Macmillan. ISBN   9781429989381.
  13. Cartwright, Shawn D. (February 2000). "SUPPLY CHAIN INTERDICTION and CORPORATE WARFARE". Journal of Business Strategy. 21 (2): 30–35. doi:10.1108/eb040072.
  14. "Corporate warfare". Financial Times. 2009. Retrieved 23 January 2017.
  15. Elimination of mercenarism in Africa: a need for a new continental approach. Institute for Security Studies (South Africa). 2008. ISBN   9781920114404 . Retrieved 23 January 2017.
  16. Ryan, Cheyney (16 May 2009). The Chickenhawk Syndrome: War, Sacrifice, and Personal Responsibility. Rowman & Littlefield Publishers. ISBN   9780742565050 . Retrieved 24 January 2017.
  17. "Big Brands Are Reimagined as Weapons of Destruction". The Creators Project. 8 November 2016. Retrieved 23 January 2017.
  18. "FOREAL - CORPORATE WARFARE". www.weareforeal.com. Retrieved 23 January 2017.
  19. D'Alessandro, Anthony (22 September 2016). "'Mr. Robot' Season 2 Finale: Sam Esmail On Shocking Twist & Possible Donald Trump Season 3 Impact". Deadline. Retrieved 24 January 2017.