At the 2014 RSA conference, computer security analyst Dan Gir delivered a speech titled “Now we are all – intelligence officers,” discussing how digital technologies are reshaping the gathering of information. He raised the question of whether everyone in the digital world now has access to information previously restricted to national intelligence officials. Several years later, this prediction has begun to come to fruition, particularly in the era of cyber espionage and widespread data collection.
An illustrative example of this shift occurred in 2021 when analysts detected unusual network connections: video surveillance cameras in Taiwan and South Korea were found to be exchanging data with critical units in India’s power system. Subsequent investigation revealed a sophisticated operation orchestrated by Chinese spies, who had covertly implanted malicious software into the energy infrastructure. Rather than being uncovered by governmental intelligence agencies, this activity was discovered by Recorded Future, a private company that monitors the entire Internet for indicators of compromise used by cyber attackers.
This case underscores how contemporary digital technologies have transformed the landscape of espionage. Surveillance cameras, of which there are over a billion worldwide, can now be weaponized for cyber attacks and sabotage, eliminating the need for physical infiltration. Operations of this nature can now be conducted remotely through extensive networks, with private entities capable of detecting and thwarting them in real time.
The modern era is increasingly defined by a digital ecosystem where the deep and dark web serve as crucial sources of information. These domains attract criminal elements seeking relative anonymity, although this anonymity is often fleeting. Companies like Flashpoint have the capability to monitor suspicious activity through tracking cryptocurrency transactions, enabling them to identify potential threats and even prevent criminal acts.
Private companies also play a vital role in defending against cyber threats. Microsoft, for instance, monitors over 78 trillion signals each day to proactively identify and neutralize potential dangers. These companies are also at the forefront of combating hackers from nations like China and Russia. In 2021, Microsoft publicly disclosed the activities of a Chinese hacker group, Volt Typhoon, which targeted critical infrastructure in the United States. This case exemplifies the proactive role that commercial entities can play in safeguarding national interests, often with greater speed and efficiency than public agencies.