The Future of Medicine: The Era of Artificial Hearts

05Between artificial knees, total hip replacements, cataract surgery, hearing aids, dentures, and cochlear implants, we are a society that is fast becoming transhuman. Basically, this means we are dedicated to improving human health through substitution and augmentation of our body parts. Lately, bioprinting has begun offering solutions for replacement organs; but so far, a perfectly healthy heart, has remained elusive.

Heart disease is the number one killer in North America, comparable only to strokes, and claiming nearly 600,000 lives every year in the US and 70,000 in Canada. But radical new medical technology may soon change that. There have been over 1,000 artificial heart transplant surgeries carried out in humans over the last 35 years, and over 11,000 more heart surgeries where valve pumps were installed have also been performed.

artificial-heart-abiocor-implantingAnd earlier this month, a major step was taken when the French company Carmat implanted a permanent artificial heart in a patient. This was the second time in history that this company performed a total artificial heart implant, the first time being back in December when they performed the implant surgery on a 76-year-old man in which no additional donor heart was sought. This was a major development for two reasons.

For one, robotic organs are still limited to acting as a temporary bridge to buy patients precious time until a suitable biological heart becomes available. Second, transplanted biological hearts, while often successful, are very difficult to come by due to a shortage of suitable organs. Over 100,000 people around the world at any given time are waiting for a heart and there simply are not enough healthy hearts available for the thousands who need them.

carmat_heartThis shortage has prompted numerous medical companies to begin looking into the development of artificial hearts, where the creation of a successful and permanent robotic heart could generate billions of dollars and help revolutionize medicine and health care. Far from being a stopgap or temporary measure, these new hearts would be designed to last many years, maybe someday extending patients lives indefinitely.

Carmat – led by co-founder and heart transplant specialist Dr. Alain Carpentier – spent 25 years developing the heart. The device weighs three times that of an average human heart, is made of soft “biomaterials,” and operates off a five-year lithium battery. The key difference between Carmat’s heart and past efforts is that Carmat’s is self-regulating, and actively seeks to mimic the real human heart, via an array of sophisticated sensors.

carmat-artificial-heartUnfortunately, the patient who received the first Carmat heart died prematurely only a few months after its installation. Early indications showed that there was a short circuit in the device, but Carmat is still investigating the details of the death. On September 5th, however, another patient in France received the Carmat heart, and according to French Minister Marisol Touraine the “intervention confirms that heart transplant procedures are entering a new era.”

More than just pumping blood, future artificial hearts are expected to bring numerous other advantages with them. Futurists and developers predict they will have computer chips and wi-fi capacity built into them, and people could be able to control their hearts with smart phones, tuning down its pumping capacity when they want to sleep, or tuning it up when they want to run marathons.

carmat_heart1The benefits are certainly apparent in this. With people able to tailor their own heart rates, they could control their stress reaction (thus eliminating the need for Xanax and beta blockers) and increase the rate of blood flow to ensure maximum physical performance. Future artificial hearts may also replace the need for some doctor visits and physicals, since it will be able to monitor health and vitals and relay that information to a database or device.

In fact, much of the wearable medical tech that is in vogue right now will likely become obsolete once the artificial heart arrives in its perfected form. Naturally, health experts would find this problematic, since our hearts respond to our surroundings for a reason, and such stimuli could very well have  unintended consequences. People tampering with their own heart rate could certainly do so irresponsibly, and end up causing damage other parts of their body.

carmat_heart2One major downside of artificial hearts is their exposure to being hacked thanks to their Wi-Fi capability. If organized criminals, an authoritarian government, or malignant hackers were dedicated enough, they could cause targeted heart failure. Viruses could also be sent into the heart’s software, or the password to the app controlling your heart could be stolen and misused.

Naturally, there are also some critics who worry that, beyond the efficacy of the device itself, an artificial heart is too large a step towards becoming a cyborg. This is certainly true when it comes to all artificial replacements, such as limbs and biomedical implants, technology which is already available. Whenever a new device or technique is revealed, the specter of “cyborgs” is raised with uncomfortable implications.

transhuman3However, the benefit of an artificial heart is that it will be hidden inside the body, and it will soon be better than the real thing. And given that it could mean the difference between life and death, there are likely to be millions of people who will want one and are even willing to electively line up for one once they become available. The biggest dilemma with the heart will probably be affordability.

Currently, the Carmat heart costs about $200,000. However, this is to be expected when a new technology is still in its early development phase. In a few years time, when the technology becomes more widely available, it will likely drop in price to the point that they become much more affordable. And in time, it will be joined by other biotechnological replacements that, while artificial, are an undeniably improvement on the real thing.

The era of the Transhumanism looms!

Source: motherboard.vice.com, carmatsa.com, cdc.gov, heartandstroke.com

Cyberwars: Watching the US and China in Real-Time

norse-hacking-map-640x353Since the dawn of the internet age, there has been no shortage of stories about hackers, malware-peddling malcontents, online scams and identity theft. Add to that the growing consensus that wars in the future will be fought online through “cyberwarfare divisions”, and you can understand why such positive statements once made about the internet – like how it would bring the world together and create “a global village” – would seem incredibly naive now.

However, despite the prevalence of hacking and cyberwarfare-related fear, very few people have actually experienced what it is like. After all, the effects of hacking are mostly invisible to the untrained eye, with the exception of very-high-profile database breaches. Now, though, a security company has produced a fascinating geographic map that shows global hacking attempts in real-time. And of course, the ongoing battle between US and Chinese forces accounts for much of it.

norse-china-usa-hacking-smallerThe real-time map, maintained by the Norse security company, shows who’s hacking who and what attack vectors are being used. The data is sourced from a network of “honeypot” servers – essentially a juicy-looking target that turns out to be a trap -maintained by Norse, rather than real-world data from the Pentagon, Google, or other high-profile hacking targets. The Norse website has some info about its “honeynet,” but it’s understandably quite sparse on actual technical details.

If you watch the map for a little while, it’s clear that most attacks originate in either China or the US, and that the US is by far the largest target for hack attacks. You can also see that the type of hack used, indicated by the target port, is rather varied. Microsoft-DS (the port used for Windows file sharing) is still one of the top targets , but DNS, SSH, and HTTP are all very popular too. CrazzyNet and Black Ice – two common Windows backdoor programs often used by script kiddies and criminals – is also sure to pop up.

Unit-61398-Chinese-Army-Hacking-Jobs-With-Great-BenefitsOn occasion, the map is likely to show a big burst of coordinated attacks coming from China and directed towards the US. And while it is difficult to blame these attacks directly on the Chinese government (as they are adept at routing their attacks through other servers) government and independent researchers are confident the majority of these attacks are being directed by the People’s Liberation Army’s Unit 61398 – aka. the PLA’s cyberwarfare division.

A lot of hacks originate in the US, too, but their targets are much more varied. And in cases where Chinese facilities (or other nations that are nominally identified as hostile to the US) you can bet that the US Cyber Command at Fort Meade is behind the lot of them. But the map is still limited in that it uses Norse’s own honeypot operations to identify these attacks, and it therefore cannot be said with absolute certainty that real attacks happen in the same fashion.

nsa_aerialBut a general picture of the size and shape of global hacking and cyberwarfare can be divined by looking at the stats. Back in 2012, the US DOD reported that it was the target of 10 million cyber attacks per day. Likewise, the National Nuclear Security Administration says it saw 10 million attacks per day in 2012. In 2013, BP’s CEO said it sees 50,000 cyber attacks per day, and the UK reported around 120,000 attacks per day back in 2011.

While the extent and purpose of these attacks certainly varies, it is pretty clear that hacking and cyberwarfare is a global problem and something that governments, corporations, and institutions need to pay attention to. Last year, the Obama administration’s announced that it would not sit idly by in the face of stepped up attacks from China. However, the subsequent testimony and document leaks by Snowden showed that the US has been conducting its own attacks the entire time (and even beforehand).

And such is the nature of war, regardless of the context or the weapons used. States rattle their swords claiming they will not tolerate aggression, but there is always a fine line between maintaining one’s defenses and escalating a situation to the point that mutual destruction becomes inevitable. Perhaps the people who are currently fighting this alleged cyberwar should look to the past – specifically to the First World War and the Cold War – to see just how effective “arms races” are!

Source: extremetech.com, map.ipviking.com

Crypto Wars: The Tech World vs. the NSA

cyber_securitySix years ago, something interesting took place at Microsoft’s Windows annual Crypto conference in Santa Barbara. In the course of the presentations, two members of the company’s security group (Dan Shumow and Niels Ferguson) gave a talk that dealt with internet security and the possibility that major systems could be hacked.

They called their presentation “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng”. That’s a name few people outside of the techy community would recognize, as it refers to a pseudorandom number generating program that is used extensively in cryptography. And thought the presentation was only nine slides and a few minutes long, they managed to capture the attention of the crowd with some rather stark observations.

cyber_security1Basically, they laid out a case showing that the new encryption standard, given a stamp of approval by the U.S. government, possessed a glaring weakness that made one of the program’s algorithms susceptible to cracking. But the weakness they described wasn’t just an average vulnerability, it had the kind of properties one would want if one were intentionally inserting a backdoor to make the algorithm susceptible to cracking by design.

At the time, no one thought much of it. But today, that’s all changed, thanks to Edward Snowden. Apparently, cryptographers and journalists are seeing a connection between the talk given by Shumow and Ferguson and the classified NSA documents Snowden leaked. Apparently, some of that information confirms that the weakness in the Dual_EC_DRBG algorithm might be indeed a backdoor.

nsa_aerialEarlier this month, an article appeared in the New York Times that implied that the backdoor was intentionally put there by the NSA as part of a $250-million, decade-long covert operation by the agency to weaken and undermine the integrity of a number of encryption systems used by millions of people around the world.

Naturally, these allegations not only stoked the fires over the NSA’s long history of spying on databases, both domestic and foreign, it has also raised questions over the integrity of the rather byzantine process that produces security standards in the first place. The National Institute of Standards and Technology (NIST) approved Dual_EC_DRBG and the standard, is now facing criticism alongside the NSA.

nist_aerialbigAnd while NIST has since been forced to re-open the program to examination and public discussion, security and crypto firms around the world are scrambling to unravel just how deeply the suspect algorithm infiltrated their code, if at all. Some even went so far as to publicly denounce it, such as corporate giant RSA Security.

But of course, a number of crypto experts have noted that the Times hasn’t released the memos that purport to prove the existence of a backdoor. What’s more, the paper’s direct quotes from the classified documents don’t mention a backdoor or efforts by the NSA to weaken it or the standard, only the efforts of the agency to push the standard through NIST’s committees for approval.

nsasecurity_primary-100041064-largeOne such person is Jon Callas, the CTO of Silent Circle – a company that offers encrypted phone communication. Having attended the Crypto conference in 2007 and heard the presentation by Shumow, he believes that the real problem may lie in the fact that the algorithm was poorly made:

If [the NSA] spent $250 million weakening the standard and this is the best that they could do, then we have nothing to fear from them. Because this was really ham-fisted. When you put on your conspiratorial hat about what the NSA would be doing, you would expect something more devious, Machiavellian … and this thing is just laughably bad. This is Boris and Natasha sort of stuff.

Sources at Microsoft agree. In addition to the presenters – who never mention the NSA in their presentation and went out of their way to avoid accusing NIST of any wrongdoing – a manager who spoke with WIRED on condition of anonymity believes the reporters at the Times saw the classified documents dealing with the program, read about the 2007 talk, and assumed their was a connection.

cryptographyBut Paul Kocher, president and chief scientist of Cryptography Research, says that regardless of the lack of evidence in the Times story, he discounts the “bad cryptography” explanation for the weakness, in favor of the backdoor one:

Bad cryptography happens through laziness and ignorance. But in this case, a great deal of effort went into creating this and choosing a structure that happens to be amenable to attack.

Personally, I find it interesting that the NSA would be so committed to making sure a program passed inspection. Especially one that had a fatal flaw that, when exploited properly, could be used to give someone who knew about it access to encrypted information. But of course, it’s not like the NSA has been known to invade people’s privacy, right? RIGHT?

Clearly, all there is at this point is speculation. One thing is certain though. In the coming weeks and months, the NSA is going to be the recipient of even more flak over its monitoring and cryptographic activities. Whether this effects any change in policy remains to be seen, but I doubt anyone will be holding their breaths.

Sources: wired.com, nytimes.com

The Rescue: A Revenger Mission Update

top_secretAtrum opened the laptop and spun it around in one fluid motion. The screen was now aimed at everyone standing in the small room, a map with a large, square configuration of buildings sitting in a large, green field in the middle of it. The overhead view provided few details, but the setting looked very similar to the one they had just left – a string of warehouses or an industrial park of some kind. Despite how confined they already felt, most felt the need to lean forward to get a better look.

“Thanks to the device the Captain handed off to us, I’ve been able to isolate the frequency of the tracker he had implanted on his person. Once I tuned my instruments to it, I was able to locate him.” He hit a button on the console, and a small, red blinking light appeared in the middle of the largest box-like structure. “This is the last reported location of the Captain. An abandoned truck park outside of Clarksville. This has to be a holding facility of some kind, or a transfer point for prisoners taken by the Intelligence services.”

“It looks weak,” said Pax, noting the frequency and intensity of the signal. “Which means he’s either barely in range or they’ve got him in some kind of hardened bunker.”

“Good eye,” replied Atrum. “I wish I knew more about the tracker he’s got, but the Captain never was one to share.”

“It’s not that far from here. If we move now, we could hit the place before they’re ready.” said Tsunami, drawing herself back up to her full height. Even with her shades on, the look on her face was plain for all to see. As was the fatigue, the poor woman had not slept since they had returned from their last outing. And she seemed destined not to until they made their next move.

“You got my vote,” said Judgement, his skin bristling with several new veins of gold.
Atrum raised his hand. “Now hold on, people. Like I said, this is a transfer point. And as Pax pointed out, its probably a hardened facility of some kind. We all remember what happened the last time we hit one of those. They were ready and waiting.”

“No shit, they were ready. They set us up!” Judgement growled.

From her spot at the outer edge of the circle, Erotica nodded. “And I seem to recall, we still managed to take out the better part of their defenders.”

“Yes, and what are the odds they’ll have so many surprises prepared for us this time around?”

It was Freedom saying this, and Atrum looked to her now. A current was flowing through the group and growing in intensity. He feared as much. After what had happened at the facility, everyone was in a hurry to rectify what they perceived as their own failure. But running headlong into a fight was likely to result in another. Conveying that though, that required some tact. There was a lot of anger in the room right now, and a lot of special powers…

“Look team… chances are, he’s going to be moved from that facility very soon. Our best bet is to try and get him while he’s in transit. The people holding him will be more vulnerable to an attack.”

“And how long will that be?” asked Panacea, her voice mild, but containing an unmistakably steely tone within.

“Before they try to move him? Shouldn’t be long. With prisoners like the Captain, they want to move them to a secure location as quickly as possible. Minimizes the chances that they might escape, or get rescued.”

Bonfire raised his voice next. “So they are anticipating that we might try to rescue him?”

Atrum shrugged. “Standard procedure really. Everything they’ve done thus far makes it look they are treating him like a high-valued enemy asset, lIke a terrorists mastermind. Always assume their followers will try to spring them.”

Judgment growled again. Everyone looked towards him just in time to see his fangs bared. “I don’t like where this conversation is going. And I don’t much like being compared to a terrorist.”

Pax raised his hands and intervened on Atrum’s behalf. “That’s not what he meant, people. Its just a question of procedures, not methods or motives. Right now, they are dealing with us as if we’re a domestic terrorist cell. But that doesn’t mean we are.”

“You’re damn right,” said Tsunami. “They started this fight. And if they want to see terror, they will shortly.”

“Terrorists,” said Panacea with a scoff. “Their methods are based in fear. They hope to paralyze us with terror and intimidate us into submission. They are cowards.”

The group began to raise their voices as one. The thought of striking fear in their enemy’s hearts, of paying back their terror with some terror of their own; it was a like lightning rod that was catching all their rage. Atrum looked to Panacea, and felt a sudden surge of trepidation himself. If even she was speaking of vengeance, then their situation was truly dire.

He raised his hands one more time and asked for calm. “Hold on, people! We need to be careful about going off half-cocked. If we try to rescue the Captain now, from this holding facility, we’re likely to hit them when they’re most prepared.”

“He’s right,” said Pax. “There’s no guarantee this isn’t an ambush too. For all we know, they’re waiting for us to make a move, to commit ourselves prematurely and run into another carefully laid trap.”

“Yeah, and while we’re waiting, what happens to the Captain?” asked Styka. She was joined by Freedom and Tsunami, both of whom began to voice their concern for his well being in Pax’s direction.

“For all we know, they’re torturing to death. He doesn’t have the ability to heal like you do.”

“And he can’t exactly just will himself out of that place. He’s stuck there until we free him. Helpless and alone.”

“No way!” said Judgement. “He’s not alone! He’s always been there for us, and we’re going to be there for him, dammit. Come hell or high water.”

Many began to voice their assent. Others began to avert their eyes, no doubt because they were having a hard time keeping their emotions in check. Anger wasn’t the only thing running the group like a current. One didn’t have to be a telepath to sense that their was a terrible amount of guilt and grief in the room as well.

“Okay,” said Atrum finally. “We’re going to be there for the Captain. But we need to do it in such a way that won’t put his life in danger. And won’t run the risk of failure. That’s not what the Captain would want. He’d be the first to tell us to play this smart.”

A short, tense silence followed. When someone did speak again, it was Angel, and Atrum could sense what she was going to say before he said it.

“I can’t help but notice that since the Captain’s departure, you’ve been stepping in to fill his shoes.” She looked to Pax next. “The two of you in fact have been acting like you’re giving the orders now. Am I the only one who notices this?”

Several more people exhibited the same combination of sudden anger, anger which they were directing at him and Pax now. It was predictable, so much emotion looking for an outlet. And since he was telling them to sit on it and wait, it was inevitable it would be directed at him. Out of desperation, he reached out to Styka and Tsunami ,using their shared telepathic link.

[I’m losing them here. I could use some help.]

Tsunami didn’t even respond. Her thoughts had become a wall, her emotions as cold and impenetrable as the look on her face. Styka answered him, but was not much more receptive.

[Don’t try to avoid them. It’s disrespectful.]

[Please. They’re not listening to reason.]

[Who’s reason? I don’t agree with your plan as it is. Don’t ask me to speak for it.]

[Fine. We can certainly disagree as to how to proceed. But the last thing we need is people turning on each other.]

Styka emitted an audible sigh. In real-time, people were beginning to shout at each other, most in Atrum’s or Pax’s direction. Few seemed to be coming to their defense, but it didn’t really matter. Even those who were in agreement seemed to be attacking each other with their words now.

Atrum reached out to Tsunami again. [Please, you can see they are on the verge of cracking. Help me restore some calm so we can sort this out.]

To his surprise, Tsunami did answer, though not quite as expected. At the far end of the room, the door blew open and a cold gust of wind thundered through. Not a soul was undisturbed by it and everyone was fast looking in Tsunami’s direction. Of all the people present, only she maintained her steady, forward-looking glare until the wind died down and the door slammed shut again.

Waiting for total quiet to return, she finally spoke. “The last thing the Captain said to me was ‘they’ll be another time’. He also told me that Atrum here would know what to do. If he has a plan… then let’s hear him out.”

Atrum was a little surprised.She said the words, but he could feel something menacing not far behind them. Though he could tell she was sincere, he wasn’t sure if what she’d said had been a vote of confidence, or a warning not to screw things up. Either way, he took his cue and continued.

“Like I said, our best bet is to hit these feds when they try to transfer the Captain. They’ll try to do it either by convoy, or by air. Either way, they will be most vulernable at this time. An convoy, even if its stacked with armored vehicles, won’t be unstoppable.”

“Yeah, we proved that much to them last time,” said Angel, looking to those who had been intrinsic in that regard. Standing not far away, Bonfire smiled while Judgment bristled happily.

“And an air lift would be useless. We’ve got several people who could take out escort choppers, and then land on board the one carrying the Captain and whisk him away before anyone could stop them. Either way, we’d have them.”

“What about aerial drones?” asked Freedom, remembering the last one and how it had ruined their day.

On that, Atrum smiled. Reaching to his laptop, he punched a few keys and brought up a new display. In the center, a large green reticule sat, with what looked like a picture of a radio wave bouncing around inside it. “Don’t worry. They caught us with our pants down last time. This time around, we’ll be ready…”

“What is that?” Erotica asked at last.

“That…” Pax interjected, “is the frequency that last drone was using. Next one we see one, we’ll be able to hack it.”

Atrum’s smile broadened, to the point where he was beaming at everyone in the room. “We all saw what just one of those things could do with its big old arsenal of missiles and bombs. Just imagine what kind of hell we could raise with that kind of firepower.”

Again, one did not need telepathy to know that the mood had suddenly changed in the room. What had been anger and grief was slowly morphing into anger and elation. Everyone was beginning to see just how good a plan they had before them, and how much it would hurt the bastards who had put them here…

Panacea was the one to say it, putting all that raw emotion into words.

“When we came together, we took the name of revenge for ourselves,” she said. “Let’s show these men what revenge looks like.”

Cyberwars: Snowden Reveals NSA’s Been Hacking China

nsa_aerialEdward Snowden, the man who blew the whistle on the NSA and its domestic surveillance program – aka. PRISM – has reemerged to reveal some additional secrets. It seems that in addition to spying on their own citizens, the NSA has been using its resources to spy on tens of thousands of operations around the world. Not surprising, but what Snowden revealed showed that when it comes to nations like China, surveillance was just the tip of the iceberg.

Snowden, who has been hiding in Hong Kong since May 20th, revealed in an interview on Thursday with the South China Morning Post that the NSA has been hacking computers in Hong Kong and mainland China since 2009. Among the targets in Hong Kong were the Chinese University of Hong Kong, public officials, businesses and even students in the city.

?????????????All told, Snowden estimated that there are more than 61,000 NSA hacking operations globally, with at least hundreds of targets in Hong Kong and on the mainland. The tactics, he claimed, involve selecting large targets and infiltrating in many places at once:

We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one.

Snowden also explained his motivation for blowing the whistle on the NSA’s foreign operations. It seems that in light recent tensions between the US and China, which has been characterized by ongoing accusations and recrimination, he felt the need to tell the truth behind the lies. As he told the SCMP, his motivation was based on:

the hypocrisy of the U.S. government when it claims that it does not target civilian infrastructure, unlike its adversaries….Not only does it do so, but it is so afraid of this being known that it is willing to use any means, such as diplomatic intimidation, to prevent this information from becoming public.

Edward-Snowden-660x367Though Snowden also discussed possible plans to seek asylum in Iceland or elsewhere during an interview last week, he told the SCMP  that he’s staying put in Hong Kong for now. He emphasized that his stay in China was not an attempt to avoid justice, but to reveal criminal behavior.  He also expressed admiration for countries that have offered asylum (such as Russia), claiming that he was “glad there are governments that refuse to be intimidated by great power.”

The Guardian newspaper, which has published information from documents leaked by Snowden, has said that it has more than a thousand other documents that Snowden managed to smuggle out or download from the NSA using a series of laptops and a thumb drive. These documents are to be disclosed in the coming weeks, according to the paper, so more revelations are expected to come.

secret_documentsThough there are those who question his motivations and methods, no one can deny that thanks to Snowden, some very questionable  behavior has been revealed that involved people at the top echelons of government. One can’t help but be reminded of Richard Clarke, former head of the NSA, who came forward in 2004 to testify before to the 9/11 Commission and reveal the extent to which the Bush Administration failed to prevent the largest terrorist attack in history, or how it sought to pin that attack on the Iraqi government.

And for those who have lived long enough to remember, these events also call to mind the Pentagon Papers of 1969. In this case, it was another whistle blower named Daniel Ellsberg who, through the publication of hundreds of government documents, revealed that the US government had been lying about the Vietnam war, the number of casualties, and the likelihood of its success. And let’s not forget  former FBI Ass. Dir. Mark Felt – aka. “Death Throat” – the man who blew the whistle on the Nixon Administration.

whistleblower-protectionIn the end, whistle blowers have a long history of ending wars, exposing corruption, and force administrations to take responsibility for their secret, unlawful policies. Naturally, there were those who are critical men such as Felt, Clarke, and Ellsberg, both then and now, but they have never been able to refute the fact that the men acted out of conscience and achieved results. And while I’m sure that their will be fallout from Snowden’s actions, I too cannot dispute that what he did needed to be done.

As Edmund Burke famously said: “The only thing necessary for the triumph of evil  is for good men to do nothing.”

Sources: wired.com, scmp.com

Hacker Wars: The Invasion Continues!

cyber-war-1024x843State-sponsored hacking has been a major concern lately. From Russia’s “Red October” virus, which spied on embassies and diplomats in multiple countries, to China’s ongoing intrusion into government and corporate databases in the US, it seems as though private hackers are no longer the only ones we need to worry about.

The latest incident in this invasion of privacy and airing of personal information comes again from Russia, where a mysterious website has been posting personal information about some rather high-profile American figures. These include First Lady Michelle Obama, Vice-President Joe Biden, Jay-Z, Britney Spears, U.S. Attorney General Eric Holder, Sarah Palin, Arnold Schwarzenegger, and the head of the FBI.

michelle-obama_fullIn addition to taunting messages and unflattering pictures, the site includes Social Security numbers, credit reports, addresses and phone numbers. No reasons are listed on the site as to why these particular people were selected, but it seems clear at this point that they were chosen due to their high-profile nature and/or positions of importance within the US government. As of last Tuesday, both the FBI and Secret Service announced that they were investigating the website.

Though it is not definitively clear where the hackers are operating from, all indications point to Russia. The first clue came when it was revealed that site bore the internet suffix originally assigned to the Soviet Union (.su), a practice which is not uncommon with Russian hackers these days. In addition, it is also connected to a Twitter account, which carried an an anti-police message posted in Russian.

hackers_securityAt the moment, neither the White House or the Secret Service is offering assessments or comments on the matter. But some thoughts have been offered by Los Angeles Police Commander Andrew Smith, who spoke on behalf of Chief Charlie Beck, who’s information was also posted. According to Beck, this is not the first time that top police officials have had their private information posted online:

“People get mad at us, go on the Internet and try to find information about us, and post it all on one site. The best word I can use to describe it is creepy. It’s a creepy thing to do.”

Frank Preciado, assistant officer in charge of the LAPDs online division, added that the information on the police chief was likely taken from what is supposed to be a secure database of city employees. And it might just offer some insight into this latest, sweeping act of inforpiracy. When all is said and done, it appears that this may simply be a case of a small but qualified group of misfits engaging in public mischief.

internetHowever, of greater concern is the fact that with this latest act of high-profile hacking, a trend that citizens were forewarned might be coming true. In December of 2012, internet security company McAfee warned of an impending attack by Russian hackers against American banks. Dubbed “Project Blitzkrieg”, the threat of the attack surfaced on a Russian hacking forum in the previous September, and McAfee was quick to advised that it was a credible one.

As of December 2012, Russian hackers had effectively infected 500 databases in the US with the promise of more to come. The cybercriminal known as vorVzakone – whose name means ‘thief in law’ – was identified as the head of the operation, whose plans called for the release of a Trojan horse virus that would allow him and his accomplices to seize control of banks’ computers to steal information and money.

cold_war

Clearly, all of these incidents amount to a major public concern. But of greater concern to me is the fact the lines being drawn in this new era of cyber-warfare are eerily familiar. Not long ago, China and Russia were locked in an ongoing feud with the US and its allies, a war fueled by ideology but based on the cultivation of technology and espionage networks.

Granted, only China’s case of cyberwarfare against the US appears to be government-backed. But between the “Red October” virus,  “Project Blitzkrieg”, and the fact that Russian hackers are in the habit of using a Soviet-era suffix to designate their activities, it seems that Russia is fertile ground for a renewed standoff with the West as well. And given that the targets have been western governments and financial institutions, would it be so farfetched to assume the government might be marginally involved?

The means may have changed, but the overall purpose remains the same. Infiltrate, destabilize, and steal information from the enemy. Are we looking at a renewed Cold War, or just the last gasps of an ideological confrontation that was supposed to have died years ago? Only time will tell…

Sources: cbc.ca, dailymail.co.uk