Skip to main content
The Road Ahead

It wasn’t the gifts, the weather or even the declining standard of BBC programming that made Christmas memorable this year, it was the number of virus attacks that were aimed at my email address over the holiday weekend.

We’ve all come to expect these as an unfortunate fact of life that like Spam, are either deleted by the Outlook or ISP filters or find their way, like virtual suicide bombers, through gaps in one’s defences and then try and wreak havoc, as part of some corrupted version of the message of goodwill to all men.

To be honest though, there are now so many viruses in circulation and so many tens of thousands of personal computers connected to “bot nets” around the world that attacks aren’t personal, they are indifferent and automated, with millions or email addresses harvested from websites and address books being hammered by what resembles a Chinese menu of virus and worm types, 24*7*365 and with no sympathy for Christmas or EID or any other calendar celebration.

We can take steps to educate the population of the UK over good security practise and at a domestic level; it may marginally reduce the damage to confidence and data together with the element of risk being attached to any Internet connection. There is however, very little we can do to influence behaviour elsewhere and at the level required to have any real impact on the problem that others like me may be experiencing on a daily basis.

As an example, let’s take the prestigious Graduate Institute of International Studies in Geneva with the URL; . I’ve seen this address before over the course of 2004 and it’s stuck in my memory because it’s a Swiss domain and an observably regular source of virus attacks on my own email address. I doubt that the Institute is aware of this or if they are, whether they are able to stop it, as perhaps their domain is being spoofed or maybe, one of their student PCs is infected. The end result however is that they and thousands of other addresses, appear to be a source of inconvenience, if not a serious threat to the rest of us, over geographical distances and with very little or nothing we can do about it.

In my last column, I mentioned a large international hotel chain with a similar problem. The IT Director tells me that after checking, they can’t find a problem or an open SMTP relay but just after he disappeared for Christmas, leaving his out of “office agent” offering seasonal greetings in German, an email I sent with a record of virus attacks was returned, by his Server, complete with a company address book of executive email addresses. This is crazy and makes a complete mockery of sensible information security practise but in many countries within Europe, this represents the norm and not the exception.

For many of us, it appears that the only available option is to change our email addresses almost as often as we change our socks. Having an address such a Simon.Moores is no longer viable in the present climate unless one expects to have ten times more junk and viruses in one’s inbox than legitimate email. In fact, on a GPRS phone, it’s an expensive liability, when calls are charged by the kilobyte.

But if I change my email address to $ it doesn’t mean that my domain, like others, won’t remain a target for tens if not hundreds and thousands of automated attacks.

The hard truth is that 2004 marks the year that viruses developed sufficient critical mass on the Internet to develop an independent existence of their own, replicating across the Internet beyond the control of our attempts to contain them.

Ten years ago, when the Internet started to make its presence felt in the public domain, it came with an atmosphere of optimism and opportunity, today it’s an environment wrapped in risk and suspicion with no end to its problems in sight. We’ve come too far, we can’t turn back and we don’t quite know where the road ahead will take us.


abigail said…
I love your information on internet connections! I bookmarked your blog and will be back soon. If you want, check out my blog on internet connections secrets, please come by!

Popular posts from this blog

Mainframe to Mobile

Not one of us has a clue what the world will look like in five years’ time, yet we are all preparing for that future – As  computing power has become embedded in everything from our cars and our telephones to our financial markets, technological complexity has eclipsed our ability to comprehend it’s bigger picture impact on the shape of tomorrow.

Our intuition has been formed by a set of experiences and ideas about how things worked during a time when changes were incremental and somewhat predictable. In March 1953. there were only 53 kilobytes of high-speed RAM on the entire planet.

Today, more than 80 per cent of the value of FTSE 500* firms is ‘now dark matter’: the intangible secret recipe of success; the physical stuff companies own and their wages bill accounts for less than 20 per cent: a reversal of the pattern that once prevailed in the 1970s. Very soon, Everything at scale in this world will be managed by algorithms and data and there’s a need for effective platforms for ma…

Civilisational Data Mining

It’s a new expression I haven’t heard before. ‘Civilisational data mining.’

Let me start by putting it in some context. Every character, you or I have typed into the Google search engine or Facebook over the last decade, means something, to someone or perhaps ‘something,’ if it’s an algorithm.

In May 2014, journalists revealed that the United States National Security Agency, the NSA, was recording and archiving every single cell-phone conversation that took place in the Bahamas. In the process they managed to transform a significant proportion of a society’s day to day interactions into unstructured data; valuable information which can of course be analysed, correlated and transformed for whatever purpose the intelligence agency deems fit.

And today, I read that a GOP-hired data company in the United States has ‘leaked’ personal information, preferences and voting intentions on… wait for it… 198 million US citizens.

Within another decade or so, the cost of sequencing the human genome …

The Big Steal

I’m not here to predict the future;” quipped the novelist, Ray Bradbury. “I’m here to prevent it.” And the future looks much like one where giant corporations who hold the most data, the fastest servers, and the greatest processing power will drive all economic growth into the second half of the century.

We live in an unprecedented time. This in the sense that nobody knows what the world will look like in twenty years; one where making confident forecasts in the face of new technologies becomes a real challenge. Before this decade is over, business leaders will face regular and complex decisions about protecting their critical information and systems as more of the existing solutions they have relied upon are exposed as inadequate.

The few real certainties we have available surround the uninterrupted march of Moore’s Law - the notion that the number of transistors in the top-of-the-line processors doubles approximately every two years - and the unpredictability of human nature. Exper…