International Journal on Criminology Volume 7, Number 1, Winter 2019/2020 | Page 50

A (Guided) Tour of the Digital Wild West and shoot back. Experts describe this in the language of trench warfare, like something akin to a close-quarter knife-fight (Report by the Office of the US Director of National Intelligence, May 2018). The following are three current examples of strategic cyberattacks: • Federal Government of the United States, Office of Personnel Management: every federal employee has a digital dossier (Standard Form 86), which contains details about their entire life: a list of every foreigner they have come into contact with since childhood, parents, partner(s), children, family, anyone with whom the person concerned has any association at all, licit or otherwise, and their medical and financial profile. In June 2015, the OPM announced that twenty-one million (that’s right, million) of these SF86 dossiers had been hacked. By whom? Umm, ... the Chinese, maybe? • August 2017, Saudi Arabia: a cyberattack on a petrochemical plant belonging to a large international company closed down operations using a minor “bug.” Targeting the controls of the plant’s key functions, this sophisticated digital attack required specialist knowledge of its design and layout. The idea was not to sabotage the plant, but to make it explode, as happened in the 1984 Bhopal disaster. The design of the plant (by Schneider Electric) is similar to that of some eighteen thousand others around the world (nuclear, petrochemical, water treatment, gas, industrial chemicals, and so on). • A software system known as ECDIS (Electronic Chart Display), commonly used in commercial shipping, (cargo vessels, tankers, and so on) can, via remote hacking, be made to distort a boat’s size and position on neighboring vessels’ GPS tracking systems by up to 300 meters. ECDIS then triggers the alarm-collision feature of the Automatic Identification System. Interference of this kind, applied to several ships in close proximity, can quickly paralyze any confined area of water, such as the English Channel. Hackers and Hacking: Present and Future Our virtual world, whether it is a company information system, an industrial network, or very simply your family computer, has never been so vulnerable, attacked on all sides without any sign of the problem being solved. (Interview with a cybersecurity expert, SDBR, April 3 2018) The Cause of the Disaster: The NSA From 2016 onward, Tailored Access Operations (TAO), the NSA’s most secret division, responsible for all offensive/intrusive aspects of target information systems, 45