Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Vast Spy System Loots Computers in 103 Countries

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
babsbunny Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:52 PM
Original message
Vast Spy System Loots Computers in 103 Countries
Edited on Sat Mar-28-09 03:58 PM by babsbunny
By JOHN MARKOFF
Published: March 28, 2009

http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&partner=rss&emc=rss

TORONTO — A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, Canadian researchers have concluded.


The Toronto academic researchers who are reporting on the spying operation dubbed GhostNet include, from left, Ronald J. Deibert, Greg Walton, Nart Villeneuve and Rafal A. Rohozinski.
Multimedia
The Vast Reach of ‘GhostNet’Graphic
The Vast Reach of ‘GhostNet’

In a report to be issued this weekend, the researchers said that the system was being controlled from computers based almost exclusively in China, but that they could not say conclusively that the Chinese government was involved.
Printer Friendly | Permalink |  | Top
Stephanie Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:53 PM
Response to Original message
1. link?
Printer Friendly | Permalink |  | Top
 
bitchkitty Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:56 PM
Response to Reply #1
2. Here's one:
Printer Friendly | Permalink |  | Top
 
Stephanie Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 05:26 PM
Response to Reply #2
3. Thanks - this is unbelievable >
The malware is remarkable both for its sweep — in computer jargon, it has not been merely “phishing” for random consumers’ information, but “whaling” for particular important targets — and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.

***

The electronic spy game has had at least some real-world impact, they said. For example, they said, after an e-mail invitation was sent by the Dalai Lama’s office to a foreign diplomat, the Chinese government made a call to the diplomat discouraging a visit. And a woman working for a group making Internet contacts between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet, shown transcripts of her online conversations and warned to stop her political activities.

***

Through trial and error, the researchers learned to use the system’s Chinese-language “dashboard” — a control panel reachable with a standard Web browser — by which one could manipulate the more than 1,200 computers worldwide that had by then been infected.

Infection happens two ways. In one method, a user’s clicking on a document attached to an e-mail message lets the system covertly install software deep in the target operating system. Alternatively, a user clicks on a Web link in an e-mail message and is taken directly to a “poisoned” Web site.
Printer Friendly | Permalink |  | Top
 
bitchkitty Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 06:49 PM
Response to Reply #3
4. Keeping up with technology..
more important now than ever.
Printer Friendly | Permalink |  | Top
 
L0oniX Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 06:52 PM
Response to Original message
5. Damn communists. n/t
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 10:19 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC