January 17, 2023
Outlook 2023: the massive proliferation of intelligence techniques just started
Russia’s aggression against Ukraine will likely be remembered as a historic turning point in world economics and international relations but also as the beginning of a new era when it comes to anticipating threats and mitigating risks – writes in his analysis Ondrej Slechta – Associate Partner NaviRisk for Czechia and the Slovak Republic.
The invasion of Ukraine has been a watershed moment for risk advisory and corporate security teams by exacerbating trends that have been growing underneath the surface for months or even years before the war started.
The war, however, has shown once and for all, the overwhelming trend of open-source intelligence and a vast amount of commercial data available resulting in the new paradigm, placing intelligence gathering as a matter not only restricted just for government spy agencies anymore.
And this is the trend the Ukrainian crisis has objectively highlighted. Journalists report developments on the battleground by using commercial space data. War crimes investigators collect evidence by analyzing TikTok videos. War propaganda and information operations are being reversed by online verification based on geolocating and attribution of the proper context. It is not surprising that this trend will, as usual, be reflected in the civilian sphere and business.
In the years to come, not only multinational companies will be facing a diverse multitude of risks stemming from the renewed war in Europe and great power competition, protectionism and de-globalization, climate change but also greenflation and environmental radicalism, as well as domestic extremism, persisting threat of terrorist attacks, not to mention rapidly changing trend of cyberattacks – he concludes.
Thus, it is not hard to imagine how the explosion of open-source intelligence, commercially available imagery intelligence, and the rise of AI will inevitably enable sorts of individuals and private companies to collect, analyze and disseminate intelligence:
➡ Tech companies in need of intelligence about cyber threats;
➡ Critical infrastructure in need of actionable information about threats that could disrupt or destroy their systems, which may result in power outages and the collapse of society;
➡ Various private/public organizations collecting evidence about sabotage actors and seeking intelligence in order to prevent workplace violence or to mitigate threats against soft targets and crowded places;
➡ Pharmaceutical and healthcare companies gathering facts about possible counterfeits and adversary activities which may harm their brand and goodwill;
We are on the verge of a new intelligence revolution and the answer to the questions of how commercial companies will adapt to this challenge will largely determine their position and performance in the coming years.
If you want to know how to protect your privacy in the age of mass surveillance or legally obtain information about your contractors – contact us at firstname.lastname@example.org
May 30, 2023
Asked why he’d robbed banks, a notorious American gangster from the Great Depression era famously replied: ‘If they kept money in candy stores, I would rob candy stores.’ Is there any connection between old-style robbers and the plight of modern l law firms? On the surface, not really. After all, what can you steal from […]
April 25, 2023
Phishing Awareness Training – Simulating Phishing Attacks
Phishing training for employees is one of the most effective ways to strengthen your company’s defences against malware, ransomware, data loss and Business E-mail Compromise (BEC) attacks. Experience shows that awareness campaigns result in a significantly reduced click-through rate after each subsequent campaign. An employee who has made a mistake becomes more vigilant and more resistant […]
April 25, 2023
Phishing – how to deal with it?
Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries […]