Item Details
Skip Navigation Links
   ActiveUsers:1144Hits:19076893Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Article   Article
 

ID134356
Title ProperAfrican nations as proxies in covert cyber operations
LanguageENG
AuthorKallberg, Jan ;  Steven, Rowlen
Summary / Abstract (Note)The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.
`In' analytical NoteAfrican Security Review vol. 23, No.3; Sep.2014: p.307-311
Journal SourceAfrican Security Review Vol: 23 No 3
Key WordsProxy War ;  Africa ;  Internet ;  Cyber Attack ;  Cyber Defense ;  State Actor ;  Offensive Cyber Operation ;  Internet Based Market


 
 
Media / Other Links  Full Text