Dallas-Mavs.com Forums

Go Back   Dallas-Mavs.com Forums > Everything Else > Political Arena

Reply
 
Thread Tools Display Modes
Old 03-29-2009, 10:30 AM   #1
GermanDunk
Diamond Member
 
Join Date: Mar 2007
Location: Deutschland
Posts: 7,885
GermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond reputeGermanDunk has a reputation beyond repute
Exclamation Snooping dragon-chinese computer infiltration

Due to your english obv. is way better than mine, this should be interesting for you. Some examination about spyware assaults on governmental computers refering to a chinese hacker network. Chinese govermental involvement not yet proven, but very possible.

Univ. of Cambridge pdf

and

Tracking ghostnet

Description

This report documents the GhostNet - a suspected cyber espionage network of over 1,295 infected computers in 103 countries, 30% of which are high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs.

The capabilities of GhostNet are far-reaching. The report reveals that Tibetan computer systems were compromised giving attackers access to potentially sensitive information, including documents from the private office of the Dalai Lama. The report presents evidence showing that numerous computer systems were compromised in ways that circumstantially point to China as the culprit. But the report is careful not to draw conclusions about the exact motivation or the identity of the attacker(s), or how to accurately characterize this network of infections as a whole. The report argues that attribution can be obscured.

The report concludes that who is in control of GhostNet is less important than the opportunity for generating strategic intelligence that it represents. The report underscores the growing capabilities of computer network exploitation, the ease by which cyberspace can be used as a vector for new do-it-yourself form of signals intelligence. It ends with warning to policy makers that information security requires serious attention.
__________________

Last edited by GermanDunk; 03-29-2009 at 10:33 AM.
GermanDunk is offline   Reply With Quote
Sponsored Links
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump




All times are GMT -5. The time now is 03:07 PM.


Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.