Internet Anthropologist Think Tank: Vast Spy System Loots Computers

  • Search our BLOG

  • HOME
    Terrorist Names SEARCH:

    Sunday, March 29, 2009

    Vast Spy System Loots Computers

    Vast Spy System Loots Computers in 103 Countries
    By Gerald Internet Anthropologist Think Tank

    A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world,...

    Their sleuthing opened a window into a broader operation that, in less than two years, has infiltrated at least 1,295 computers in 103 countries, including many belonging to embassies, foreign ministries and other government offices, as well as the Dalai Lama’s Tibetan exile centers in India, Brussels, London and New York.....

    The researchers, who have a record of detecting computer espionage, said they believed that in addition to the spying on the Dalai Lama, the system, which they called GhostNet, was focused on the governments of South Asian and Southeast Asian countries.

    Intelligence analysts say many governments, including those of China, Russia and the United States, and other parties use sophisticated computer programs to covertly gather information.

    The newly reported spying operation is by far the largest to come to light in terms of countries affected.

    This is also believed to be the first time researchers have been able to expose the workings of a computer system used in an intrusion of this magnitude.

    The malware is remarkable both for its sweep — in computer jargon, it has not been merely “phishing” for random consumers’ information, but “whaling” for particular important targets — and for its Big Brother-style capacities. It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed.

    The researchers were able to monitor the commands given to infected computers and to see the names of documents retrieved by the spies, but in most cases the contents of the stolen files have not been determined. Working with the Tibetans, however, the researchers found that specific correspondence had been stolen and that the intruders had gained control of the electronic mail server ....



    Gee the New York Times article exposes just part of the
    capabilities, rootkits etc.

    Someone should have a counter Intelligence system. We have.

    The technology to take over that Spy System already exists.

    Tactical Internet Systems analyst.



    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home