Sochi Olympics and the Security Risks Applied by Both Hackers and SORM

by

Sochi Winter Olympics 2014 have already captured the attention of many people, both athletes and journalists, along with spectators and sports enthusiasts all over the world. However, walking hand in hand with great popularity and increased attention come lack of online security and fear of data interception. It goes without even saying that all the people that have visited Sochi are not without their laptops or mobile devices. All these devices are sources that can lead to several security breaches on a regular basis.

Without panicking, it is true that the greatly increased number of people in Sochi has been threatening when it comes to the overall security of the Internet and the personal information of the athletes, as well as the journalists and the visitors of these games. There are two different options when it comes to security breaches and their aim is not identical. Of course, hackers wish to snoop around and get their hands on useful knowledge and information that might come in handy to them. However, they are not the only ones who want to see what Sochi is up to online.

Apart from the hackers, SORM has been authorized to scan through the personal data online and ensure that everything runs smoothly. SORM is in fact the System for Operative Investigative Activities and complies with the Russian National Security. Of course, this does ring a bell to us concerning NSA tactics and methods used widely. So, besides the hackers all around, you should also draw your attention to the data interception of the people inside the Russian Government who may be suspicious of something and want to look further into it.

There is no serious differentiation as to the level of penetration when it comes to laptops and mobile phones, so you should be well aware of the risk that you are taking if you are in Sochi. Apparently, avoiding wi-fi hotspots and minimizing your use of such devices can work wonders and keep you off the hook, along with the use of VPN.