The 10 Digital Risk Predictions for 2004
    
   
  
  
  
  London, UK - 9 December 2003, 16:00 GMT -As the last twelve months 
    have unfolded, even those chairmen and chief executives who had previously 
    expressed little interest in technology issues have suddenly begun to talk 
    about their corporate experience in dealing with business interruption caused 
    frequently by computer viruses, worms, spammers and denial of service extortion. 
    This indicates that digital risk management has clearly crept up the board's 
    agenda and now concerns executive decision making much more regularly.
    
    The art of making accurate predictions is based on understanding the historic 
    trends, future motivations and the scenarios that new technology makes possible 
    with every passing year. However, we cannot hope to rival the precision of 
    this statement from The Life of Brian: 
    
    "There shall in that time be rumours of things going astray, erm, 
    and there shall be a great confusion as to where things really are, and nobody 
    will really know where lieth those little things wi-with the sort of raffia-work 
    base, that has an attachment. At that time, a friend shall lose his friends 
    hammer, and the young shall not know where lieth the things possessed by their 
    fathers that their fathers put there only just the night before, about eight 
    O'clock." 
    
    Without further ado, the mi2g Intelligence Unit's top ten predictions 
    for next year are:
    
    1. In 2004 there will be a metamorphosis in the nature of digital attacks. 
    It will no longer be possible to classify them along the rigid lines currently 
    employed, such as viruses, worms, spam, denial of service, hacker attacks, 
    Trojan software etc. It will be common to see viruses delivering spam; spam 
    becoming a propaganda tool of rogue states, radical militant and religious 
    groups; as well as sophisticated malware attacks that more closely mimic the 
    way in which hackers manifest their skills. The prediction for the number 
    of overt digital hacker attacks worldwide in 2004 is 350,000. The most targeted 
    country will remain USA followed by NATO member countries - especially the 
    UK and Germany. Most of the attacks will originate from developing countries 
    upon OECD countries. Government computer networks will increasingly be successfully 
    breached, especially those of China, South Korea, Brazil and Scandinavian 
    countries. 
    
    2. The amount of spam will continue to rise and could constitute as 
    much as two thirds of all email traffic worldwide. The war between the spammers 
    and anti-spam block list community will intensify. The productivity drag from 
    spam to the global economy will exceed $60bn in 2004. Tight anti-spam measures 
    will add to the inconvenience of not being able to communicate with long established 
    contacts swiftly as some genuine email messages will invariably get mis-routed, 
    mis-filed or deleted. Senior executives will once again resort to facsimile 
    messaging as they did in the 1980s and early 1990s.
    
    3. The intellectual gain or "for fun" motivation for virus 
    writers and hackers will continue to recede and the dominant reason to hack, 
    write malware or send spam will be financial gain. All manner of financial 
    fraud and scams based on exploiting trust associated with established brand 
    names will become commonplace. Ordinary households and small entities will 
    be the primary victims of such scams. Sophisticated identity theft will continue 
    to proliferate as online bank accounts and electronic payment facilities in 
    particular are targeted because of poor single layer authentication reliant 
    only on passwords and text. Introduction of smart card and basic biometric 
    authentication is likely to take place within the coming two years.
    
    4. Command and control attacks that target and cripple specific organisations 
    within financial services, aviation, transport, telecommunications, utilities 
    or emergency services will be witnessed. Those attacks may be orchestrated 
    by a combination of malware, hacker attacks and insider help. As a result, 
    a major electricity distribution network, an airline's reservation capability, 
    bank ATMs, mobile telephone access or emergency response capability could 
    go down with a domino effect. 
    
    5. Outsourcing will begin to manifest serious risk. All manner of electronic 
    crime will originate from countries where multi-nationals have outsourced 
    customer support and software development. The privacy of confidential customer 
    data will be violated as off-shore workers migrate from one job to the next 
    or begin to participate in organised crime rackets. Watch out for outsourcing 
    risks manifesting adversely through off-shore centres in India, China, The 
    Russian Federation, Mexico, Brazil and Philippines.
    
    6. Fundamentalist hacking, crippling malware proliferation, denial 
    of service attacks and propaganda spam are likely to grow in the context of 
    domestic insurgence and trans-national militant activity. The origin of this 
    malevolence is likely to be based in Morocco, Egypt, Saudi Arabia, Kuwait, 
    Pakistan, Central Asian Republics, Indonesia and Malaysia. Backlash hacktivism 
    originating from USA, UK, Germany, Italy, Israel and India can also be expected. 
    Fundamentalist hacking will continue to precede physical terrorism by a factor 
    of eight to ten weeks as has already been witnessed in the case of terrorism 
    in Bali, Casablanca, Riyadh and Istanbul as well as the targeting of American, 
    British, Italian and other NATO member countries' commercial and government 
    interests.
    
    7. There will be at least three major malware - virus or worm - attacks 
    in 2004 where the damage worldwide will exceed $30bn in each instance. Despite 
    this, anti-virus tool kit and firewall vendors will find it difficult to make 
    money out of retail customers as operating system vendors will offer those 
    products for free either through strategic alliances or by incorporating the 
    security functionality within the underlying software. Public and private 
    trust in software vendors will continue to erode. New flavours and product 
    launches of proprietary operating systems and associated applications will 
    find it difficult to convince established customers and new buyers to part 
    with cash unless security becomes guaranteed and the sunk cost is recompensed 
    if a mission critical system becomes infected with malware and is rendered 
    useless. Within the corporate environment, there will be increased confusion 
    about which security products and services to budget for and procure. There 
    will be more emphasis on training personnel.
    
    8. Many governments around the world will note the economic impact 
    of digital risk on their GDP and demand redressal from software vendors for 
    themselves and their large businesses, set up early warning centres and migrate 
    their computer systems from proprietary to open source solutions. The total 
    economic damage from all types of digital attack worldwide will cross $250bn 
    in 2004 but the rate of increase could slow considerably as investment in 
    digital risk education and training accelerates. Legislation will be passed 
    across the world to bring computer criminals to justice. Law enforcement agencies 
    across the globe will report the arrest of several trans-national criminal 
    syndicates operating in the close knit matrix of drug trafficking, contraband 
    and counterfeit goods, illegal immigrants, credit card and other financial 
    fraud, as well as computer crime. 
    
    9. Fixed connection computing will continue to give way to wireless 
    connectivity that will pave the way for pervasive computing anytime anywhere. 
    SMS messaging spam and mobile-telephone specific malware will emerge and present 
    a growing challenge. Base stations belonging to mobile telephone operators 
    could get hijacked to send millions of unwanted SMS messages soliciting purchase 
    of product or disseminating propaganda. Satellite upload links could also 
    be hijacked by militia or criminal syndicates from developing countries to 
    push through a particular criminal agenda or anti-government message. 
    
    10. Some 'reputable' authors and large software vendors will continue 
    to form macro-groups to question mi2g's research; and use distributed-defamation-of-reputation 
    attacks to propel inane comments on search engine hierarchies against mi2g 
    and its team members. We will continue to welcome all feedback with a smile.
    
    The mi2g team would like to take this opportunity to wish all our friends 
    and their families a Merry Christmas and a Happy New Year!
   
  
  [ENDS]
  
  Also read Predictions for 2003 - How accurate was mi2g?
  Full details of the November 2003 report are available as of 1st December 
    2003 and can be ordered from here. 
    (To view contents sample please click here). 
    
  
  Become a member of the Inner 
    Sanctum to retrieve articles in full.