- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
CSO - Data loss, privacy violations, stolen source code, malware development, and more. In hindsight, 2013 was busy year for security professionals, as well as a costly one for the organizations and individuals targeted by criminals.
|The biggest Internet security challenges of 2013|
|2013 tech news quiz|
|10 top tests of 2013|
|2013: The 12 months of Cisco|
|Full list of stories looking back at 2013 in the tech industry.|
As mentioned, 2013 was a busy year with regard to security incidents. While there's still a month left, the fact remains that one-hundred million plus records have been compromised during the past eleven months. The source of this loss has been blamed on everything from nation state attacks and activists, to hackers with an agenda.
+ ALSO ON NETWORK WORLD The biggest Internet security challenges of 2013 +
No look back at 2013 can skip Edward Snowden, and given the scale of news related to him, an entire retrospective could be dedicated to the topic. The former NSA contractor leaked anywhere from 50,000 to 200,000 documents to the press (Glenn Greenwald and Laura Poitras). His actions exposed the expansive data collection and surveillance operations of the NSA and their partners, including Britain's GCHQ. Specifically, the materials leaked by Snowden exposed programs with names such as PRISM, Boundless Informant, and Tempora. These programs are now known to have been managed with little to no oversight, and to have overstepped their mandate in some cases.
Snowden's saga is on going, and the government's reaction to his disclosures has sparked countless debates in Congress. These debates carried over to the public, where some call him a traitor, while others call him a hero. In June, federal prosecutors charged Snowden with theft of government property, as well as unauthorized communication of national defense information, leveling the 1917 Espionage Act against him. Currently, he resides in Russia where he was granted asylum for one year in August.
Snowden's disclosures have had a disastrous consequence however. In Britain, it was recently reported that the staff at the Guardian (the newspaper to first report on Snowden's leaked data) may face terrorism charges for their coverage and handling of the Snowden documents . Such charges, or worse convictions, would cripple the journalism field and silence those who act as the public's eyes.
Additionally, Snowden's disclosures have also had a ripple effect in the private sector. Silent Circle and Lavabit closed their email services out of concerns over government surveillance. However, the upside to the Snowden saga is that the public has started experimenting and adopting secure communication standards, including using Off-the-Record for chatting, PGP for email, and Tor for browsing. While these options are not wide-spread, general discussions about them and how to use them are taking place more frequently, which is viewed as a good thing by privacy advocates.
While recent, the breach at Adobe makes the list of notable security incidents in 2013 both for the number of records compromised, and the fact that Adobe also had source code taken during the attack.