Cyber spying

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of proxy servers,[1] cracking techniques and malicious software including Trojan horses and spyware.[2][3] It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.[2]

Details

Cyber spying typically involves the use of such access to secrets and classified information or control of individual computers or whole networks for a strategic advantage and for psychological, political and physical subversion activities and sabotage.[4] More recently, cyber spying involves analysis of public activity on social networking sites like Facebook and Twitter.[5]

Such operations, like non-cyber espionage, are typically illegal in the victim country while fully supported by the highest level of government in the aggressor country. The ethical situation likewise depends on one's viewpoint, particularly one's opinion of the governments involved.[4]

In response to reports of cyber spying by China against the United States, Amitai Etzioni of the Institute for Communitarian Policy Studies has suggested that China and the United States should agree to a policy of mutually assured restraint with respect to cyberspace. This would involve allowing both states to take the measures they deem necessary for their self-defense while simultaneously agreeing to refrain from taking offensive steps or engaging in cyber espionage; it would also entail vetting these commitments.[6] In September 2015, the United States and China agreed not to allow parties in their nations to cyberspy on each other for commercial gain, but did not prohibit government spying.[7]

Examples

  • The Dukes: a well-resourced, highly dedicated and organized cyber espionage group that F-Secure believes has been working for the Russian Federation since at least 2008.[8][9][10]
gollark: Alpine!
gollark: You can forward, say, `/service1` to something else.
gollark: Then you can't really get valid SSL certificates.
gollark: There are dynamic DNS services for that.
gollark: Yes.

See also

References

  1. "Residential proxy network use cases". GeoSurf. Retrieved 28 September 2017.
  2. "Cyber Espionage". PC Magazine.
  3. "Cyberspying". Techopedia.
  4. Messmer, Ellen. "Cyber Espionage: A Growing Threat to Business". Retrieved Jan 21, 2008.
  5. "Five Ways the Government Spies on You". The LockerGnome Daily Report. 7 November 2011.
  6. Diplomat, Amitai Etzioni, The. "MAR: A Model for US-China Relations". The Diplomat. Retrieved August 31, 2019.
  7. Josep Steinberg (September 27, 2015). "Why the China-US CyberSecurity Agreement Will Fail". Inc. Retrieved September 27, 2015.
  8. "the Dukes, timeline". Archived from the original on 2015-10-13. Retrieved 2015-10-13.
  9. "The Dukes Whitepaper" (PDF).
  10. "F-Secure Press Room - Global".

Sources


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.