- Cyber spying
-
Cyber spying or Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using illegal exploitation methods on the Internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.
Cyber spying typically involves the use of such illegally gained access to secrets and classified information or illegally gained control of individual computers or whole networks for an unethical and illegal strategic advantage and for psychological, political and physical subversion activities and sabotage. More recently, cyber spying invovles analysis of public activity on social networking sites like Facebook and Twitter[1]
See also
- Chinese Intelligence Operations in the United States
- Computer surveillance
- Computer insecurity
- Cyber-security regulation
- Cyberwarfare
- Economic and Industrial Espionage
- Espionage
- GhostNet
- Proactive Cyber Defence
- Surveillance
References
- Bill Schiller, Asia Bureau (Apr 01, 2009), Chinese ridicule U of T spy report - But government officials choose words carefully, never denying country engages in cyber-espionage, Toronto, Ontario, Canada, http://www.thestar.com/News/World/article/611481, retrieved 2009-04-04
- Kelly, Cathal (Mar 31, 2009), Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments, Toronto, Ontario, Canada, http://www.thestar.com/News/World/Article/610860, retrieved 2009-04-04
- All about Chinese cyber spying, infotech.indiatimes.com (Times of India), March 30, 2009, http://infotech.indiatimes.com/quickiearticleshow/4334292.cms, retrieved 2009-04-01
- Cooper, Alex (March 30, 2009), We can lead in cyber spy war, sleuth says; Toronto investigator helped expose hacking of embassies, NATO, Toronto, Ontario, Canada, http://www.thestar.com/news/canada/article/610329, retrieved 2009-03-31
- Chinese-based cyber spy network exposes need for better security: Cdn researchers, Yahoo News Canada, March 30, 2009, http://ca.news.yahoo.com/s/capress/090330/national/computer_spying, retrieved 2009-03-31[dead link]
- Steve Herman (30 March 2009), Exiled Tibetan Government Expresses Concern over Cyber-Spying Traced to China, New Delhi: GlobalSecurity.org, http://www.globalsecurity.org/intell/library/news/2009/intell-090330-voa01.htm, retrieved 2009-03-31
- "Chinese government accused of cyber spying", Belfast Telegraph, 30 March 2009, http://www.belfasttelegraph.co.uk/news/world-news/chinese-government-accused-of-cyber-spying-14248347.html
- Patrick Goodenough, International Editor (March 30, 2009), China Rejects Cyber Spying Allegations; ‘Dalai Lama Propaganda’, CNSNews.com, http://www.cnsnews.com/public/content/article.aspx?RsrcID=45797, retrieved 2009-03-31[dead link]
- Harvey, Mike (March 29, 2009), "'World's biggest cyber spy network' snoops on classified documents in 103 countries", The Times (London), http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece, retrieved 2009-03-30
- Major cyber spy network uncovered, BBC News, 29 March 2009, http://news.bbc.co.uk/2/hi/americas/7970471.stm, retrieved 2009-03-30
- SciTech Cyber spy network 'smoking gun' for China: expert, CTV Canada, March 29, 2009, http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/20090329/China_Hackers_090329/20090329?hub, retrieved 2009-03-30
- Kim Covert (March 28, 2009), "Canadian researchers uncover vast Chinese cyber spy network" ([dead link]), National Post, Don Mills, Ontario, Canada (Canwest News Service), http://www.nationalpost.com/news/story.html?id=1440426
- US warned of China 'cyber-spying', BBC News, 20 November 2008, http://news.bbc.co.uk/2/hi/asia-pacific/7740483.stm, retrieved 2009-04-01
- Mark Hosenball (June 2, 2008), "Intelligence - Cyber-Spying for Dummies", Newsweek, http://www.newsweek.com/id/138520
- Walton, Gregory (April 2008). "Year of the Gh0st RAT". World Association of Newspapers. http://www.beijing2008conference.com/articles.php?id=101. Retrieved 2009-04-01.
- German court limits cyber spying, BBC News, 27 February 2008, http://news.bbc.co.uk/2/hi/europe/7266543.stm
- Rowan Callick; Jane Macartney (December 7, 2007), "Chinese fury at cyber spy claims", The Australian, http://www.theaustralian.news.com.au/story/0,25197,22882854-2703,00.html
External links
- Congress to Investigate Google Charges Of Chinese Internet Spying (AHN)
- Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)
- Twitter: InfowarMonitor
- Spy software for cyber spies
Espionage Agent handling · Asset · Black operation · Black bag operation · Concealment device · Cryptography · Cut-out · Dead drop · Eavesdropping · False flag · Industrial espionage · Intelligence assessment · Interrogation · Numbers station · One-way voice link · Official cover · Non-official cover · Resident spy · Steganography · SurveillanceIntelligence cycle management Intelligence
collection
managementHuman
Intelligence
(HUMINT)Clandestine HUMINT (recruiting · operational techniques · Covert action · Direct action · Clandestine cell system)
Special reconnaissance (organizations)
Espionage (Agent handling · Asset · Black operation · Black bag operation · Concealment device · Cryptography · Cut-out · Dead drop · Eavesdropping · False flag · Industrial espionage · Intelligence assessment · Interrogation · Numbers station · One-way voice link · Official cover · Non-official cover · Resident spy · Steganography · Surveillance)Signals
Intelligence
(SIGINT)Measurement
and Signature
Intelligence
(MASINT)Others Open source intelligence (OSINT) · Imagery intelligence (IMINT) · Geospatial intelligence (GEOINT) · /Financial intelligence (FININT) · Technical intelligence (TECHINT) · Market Intelligence (MARKINT)Intelligence
analysis
managementIntelligence
dissemination
managementCategories:- Cyberwarfare
- Espionage
- Intelligence (information gathering)
- Military intelligence collection
- Computer security
- Computer crimes
- Information sensitivity
- Sabotage
- Spyware
- Mass intelligence-gathering systems
- Security engineering
- Social engineering (computer security)
- National security
- Computer security procedures
- Hacking (computer security)
- Computing terminology
Wikimedia Foundation. 2010.