US Supreme Court rejects Trump's bid to halt hush-money case sentencing    Al-Jasser inaugurates phased operation of Terminal 1 at Riyadh airport    NCM forecasts rainfall in most Saudi regions until Sunday    SFDA warns of potential risks associated with high doses of Ginseng    King Salman and Crown Prince congratulate new Lebanese President Joseph Aoun    Energy minister: Saudi Arabia is keen on enhancing energy cooperation with Greece    Minimum 30-day validity of Iqama is required to issue final exit visa    GASTAT: Industrial Production Index rises by 3.4% in November 2024    Al-Qaryan Group begins 125,000 m2 decommissioning project for Ibn Rushd in Yanbu    Oscar nominations postponed because of LA fires    Stories of heroism emerge as Los Angeles infernos rage    Elon Musk's interference in national debates angers Europe's leaders    Ukraine says it attacked fuel depot serving Russian strategic bombers' air base    Islamic Arts Biennale 2025 to witness first-ever display of full kiswah of Kaaba outside Makkah city    Oman aims for metro project by 2032, minister says    Rajković shines as Al-Ittihad edge Al-Hilal in dramatic King's Cup quarter-final    Al-Qadsiah secures spot in King's Cup semi-finals with dominant win over Al-Taawoun    Barcelona and Athletic Bilbao arrive in Jeddah ahead of Spanish Super Cup semi-final    Saudi Arabia announces dates and venues for AFC Asian Cup 2027    Demi Moore continues comeback with Golden Globe win    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Filipino pilgrim's incredible evolution from an enemy of Islam to its staunch advocate    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Real-life spy thriller in cyberspace
By Eric Auchard
Published in The Saudi Gazette on 02 - 04 - 2009

ONCE in a while a good computer security scare comes along that has all the makings of a taut Cold War spy thriller and the latest news of a global computer espionage ring is one such story.
A new report entitled “Tracking GhostNet: Investigating a Cyber Espionage Network,” argues that poorly defended computers used by government and private organizations in 103 nations may have been violated. The study has attracted widespread media attention after a New York Times story about it at the weekend.
The study by a group of activist researchers based in Toronto called “Information Warfare Monitor” says computers in various foreign ministries, embassies and Taiwanese trade groups have been pilfered by computers located at a Chinese government intelligence centre on the island of Hainan.
A computer in the private offices of the Dalai Lama was infected and e-mail lists and negotiating documents were stolen using a virus that “phoned home” to its controller, it alleges.
Data retrieved in the attacks appears to have been used to rein in Tibetan critics of China. But the report has trouble pinning the theft of computer secrets back to the Chinese government. It is also unclear how much information of value was gathered, outside a handful of instances. It conflates evidence of sniffing with acts of actual snooping.
A spokesman for China's Foreign Ministry has dismissed the report's claims as rumour and said his government was committed to protecting Internet security. “There's a ghost abroad called the Cold War and a virus called the China threat,” ministry spokesman Qin Gang told a news conference.
In fairness, the researchers acknowledge up front that its findings raise more questions than answers and that it is “not clear whether the attacker(s) really knew what they had penetrated, or if the information was ever exploited for commercial or intelligence value.” It says that proving who is responsible for cyber attacks remains a major challenge – what experts refer to as the “attribution problem.”
The report was conducted at the request of the office of the Dalai Lama and Tibetan exile organizations, who have long accused the Chinese government of using cyber war to disrupt their activities.
It describes the sophisticated techniques used to infiltrate the computers of the offices of the Tibetan government-in-exile. But the connections it draws to a wider global spy ring are sketchy. Some of the break-ins may be explained by shoddy computer maintenance.
In cyberliterature, the bad guys, typically unknown, break into vital government, military, banking or political organizations and cause immeasurable damage or steal uncounted billions of dollars. Throw in contemporary geopolitical rivalries and references to the latest techno-jargon and the formula is more or less complete.
To be sure, international computer security experts have seen the hand of Chinese hackers in growing number of computer intrusions around the world in recent years. The global scale combined with the sophisticated targeting of specific computers by GhostNet make most efforts at wiretapping government opponents scrawny by comparison.
But China is not alone among major world governments in viewing cyber warfare as a tenet of national security. To an unknown degree, for example, the United States, Israel and Britain snoop not just on their enemies but also their critics.
The problem with much of the writing about computer security is that it conflates basic issues of computer hygiene with diabolical threats to society or the economy. In the virtual world, teenage vandalism of web sites blurs into acts of terror.
Police and government officials don't help by painting the Internet's inherent tension between openness and security as a danger to public safety.


Clic here to read the story from its source.