Hacking + Securities Fraud = New Face of Insider Trading
Hacker groups have turned their attention to stock markets not just to disrupt operations but also to trade and make financial gains.
- Ajey Lele , Munish Sharma
- September 02, 2015
Hacker groups have turned their attention to stock markets not just to disrupt operations but also to trade and make financial gains.
While the Wassenaar Arrangement has instant recall in nuclear circles, it has only recently become a source of turmoil in cybersecurity, after the US Bureau of Industry and Security published rules that are applicable to cyber technologies.
India’s vulnerability to cyber-attacks is going to increase exponentially with the development of infrastructure and programmes such as Digital India, National Optical Fibre Network, e-Governance, e-commerce and e-Services. The NCC provides a ready resource for picking up India’s cyber warriors in the available time frame.
While Asia is home to the largest number of internet users on the planet, there is comparatively little contribution from the region to the discussions on cybersecurity.
There is an intricate relationship between the methods of cyber espionage and the evolution of information and communications technology, of which information security is a key aspect. This article is an attempt to establish forward and backward linkages of cyber espionage. It examines the geopolitics, methods, role of information security technology and, most importantly, how the future of cyber espionage is being shaped by emerging technologies such as supercomputing, quantum computing and ‘big data’, from an Indian perspective.
The IS frequently releases graphic videos of, for instance, beheadings, on social media. Once these videos surface, an ethical debate arises about the sharing of violent imagery and how these social platforms should deal with the situation.
India, the IT nation, did not make a news splash at CyberTech 2014. That is worth a passing thought. Because cyber is the fifth and new domain of warfare, after land, sea, air and space.
Effective cybersecurity calls for a close partnership between the government in its role as custodian of the nation’s security, and the private sector, in both roles of information infrastructure provider as well as the provider of many critical services.
US authorities have claimed that North Korea was behind the cyber-attack on Sony Pictures. But North Korea has strongly denied this claim. Now, both countries are threatening to fight this ‘battle’ in cyber space.
Governments find themselves struggling to deal with the issue of cybersecurity. Given the current state of play in cybersecurity, it is not surprising that any discussion sooner or later ends up as a confusing mix of viewpoints on fundamental rights, privacy, law enforcement, human rights, globalisation and national security, thus leading to a gridlock.



