请输入您要查询的百科知识:

 

词条 Cyber spying
释义

  1. Details

  2. Examples

  3. References

  4. Sources

  5. External links

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of proxy servers[1], cracking techniques and malicious software including Trojan horses and spyware.[2][3] It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmer

.[2]

Details

Cyber spying typically involves the use of such access to secrets and classified information or control of individual computers or whole networks for a strategic advantage and for psychological, political and physical subversion activities and sabotage.[4] More recently, cyber spying involves analysis of public activity on social networking sites like Facebook and Twitter.[5]

Such operations, like non-cyber espionage, are typically illegal in the victim country while fully supported by the highest level of government in the aggressor country. The ethical situation likewise depends on one's viewpoint, particularly one's opinion of the governments involved.[4]

In response to reports of cyber spying by China against the United States, Amitai Etzioni of the Institute for Communitarian Policy Studies has suggested that China and the United States should agree to a policy of mutually assured restraint with respect to cyberspace. This would involve allowing both states to take the measures they deem necessary for their self-defense while simultaneously agreeing to refrain from taking offensive steps or engaging in cyber espionage; it would also entail vetting these commitments.[6] In September 2015, the United States and China agreed not to allow parties in their nations to cyberspy on each other for commercial gain, but did not prohibit government spying.[7]

Examples

The Dukes, a well-resourced, highly dedicated and organized cyberespionage group that F-Secure believe has been working for the Russian Federation since at least 2008.[8][9][10]

== See also ==

{{div col}}
  • Chaos Computer Club
  • Chinese intelligence operations in the United States
  • Computer surveillance
  • Cyber-collection
  • Cybersecurity
  • Cyber-security regulation
  • Cyber spying on universities
  • Cyber threat intelligence
  • Cyberwarfare
  • Employee monitoring software
  • Espionage
  • GhostNet
  • Industrial espionage
  • Proactive Cyber Defence
  • Surveillance
  • Titan Rain
{{div col end}}

References

1. ^{{cite web|title=Residential proxy network use cases|url=https://www.geosurf.com/proxy-use-cases/|publisher=GeoSurf|accessdate=28 September 2017}}
2. ^{{cite web|title=Cyber Espionage|url=https://www.pcmag.com/encyclopedia/term/64376/cyber-espionage|publisher=PC Magazine}}
3. ^{{cite web|title=Cyberspying|url=http://www.techopedia.com/definition/27101/cyberspying|publisher=Techopedia}}
4. ^{{cite web|last=Messmer|first=Ellen|title=Cyber Espionage: A Growing Threat to Business|url=http://www.pcworld.com/article/141474/article.html|accessdate=Jan 21, 2008}}
5. ^{{cite web|url=https://lockergnome.com/2011/11/07/five-ways-the-government-spies-on-you/|title=Five Ways the Government Spies on You|date=7 November 2011|website=The LockerGnome Daily Report}}
6. ^Etzioni, Amitai, "MAR: A Model for US-China Relations," The Diplomat, September 20, 2013
7. ^{{cite news| url=http://www.inc.com/joseph-steinberg/why-the-china-us-cybersecurity-agreement-will-fail.html |work=Inc. | title=Why the China-US CyberSecurity Agreement Will Fail | date=September 27, 2015 | accessdate=September 27, 2015 |author=Josep Steinberg |authorlink=Joseph Steinberg}}
8. ^{{cite web|url=https://campaigns.f-secure.com/dukes-timeline/index.html|title=the Dukes, timeline|publisher=}}
9. ^{{cite web|url=https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf|title=The Dukes Whitepaper|publisher=}}
10. ^{{cite web|url=https://press.f-secure.com/?|title=F-Secure Press Room - Global|publisher=}}

Sources

  • {{citation|url=https://www.thestar.com/News/World/article/611481|title=Chinese ridicule U of T spy report - But government officials choose words carefully, never denying country engages in cyber-espionage|author=Bill Schiller, Asia Bureau |periodical=Toronto Star (Canada)|date=Apr 1, 2009|accessdate=2009-04-04 |journal=|publication-place=Toronto, Ontario, Canada}}
  • {{citation|url=https://www.thestar.com/News/World/Article/610860|title=Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments|periodical=Toronto Star (Canada)|date=Mar 31, 2009|accessdate=2009-04-04 | first=Cathal | last=Kelly|journal=|publication-place=Toronto, Ontario, Canada}}
  • {{citation|url=http://infotech.indiatimes.com/quickiearticleshow/4334292.cms|title=All about Chinese cyber spying|publisher=infotech.indiatimes.com (Times of India)|date=March 30, 2009|accessdate=2009-04-01}}
  • {{citation|url=https://www.thestar.com/news/canada/article/610329|title=We can lead in cyber spy war, sleuth says; Toronto investigator helped expose hacking of embassies, NATO|periodical=Toronto Star (Canada)|date=March 30, 2009|accessdate=2009-03-31 | first=Alex | last=Cooper|journal=|publication-place=Toronto, Ontario, Canada}}
  • {{citation|title=Chinese-based cyber spy network exposes need for better security|date=|url=http://www.cybertalkblog.co.uk/cyber-news-blog/cyber-spy-ring-china-exposed/|publisher=|accessdate=}}
  • {{citation|url=http://www.globalsecurity.org/intell/library/news/2009/intell-090330-voa01.htm|title=Exiled Tibetan Government Expresses Concern over Cyber-Spying Traced to China|author=Steve Herman|accessdate=2009-03-31|place=New Delhi|publisher=GlobalSecurity.org|date=30 March 2009}}
  • {{citation|url=http://www.belfasttelegraph.co.uk/news/world-news/chinese-government-accused-of-cyber-spying-14248347.html|title=Chinese government accused of cyber spying|periodical=Belfast Telegraph|date=30 March 2009}}
  • {{citation|url=http://www.cnsnews.com/public/content/article.aspx?RsrcID=45797 |title=China Rejects Cyber Spying Allegations; ‘Dalai Lama Propaganda’ |accessdate=2009-03-31 |author=Patrick Goodenough, International Editor |publisher=CNSNews.com |date=March 30, 2009 |deadurl=yes |archiveurl=https://web.archive.org/web/20090331103255/http://www.cnsnews.com/public/Content/Article.aspx?rsrcid=45797 |archivedate=March 31, 2009 }}
  • {{citation|url=http://www.timesonline.co.uk/tol/news/uk/crime/article5996253.ece|title='World's biggest cyber spy network' snoops on classified documents in 103 countries|periodical=The Times|publication-place=London|date=March 29, 2009|accessdate=2009-03-30 | first=Mike | last=Harvey}}
  • {{citation|url=http://news.bbc.co.uk/2/hi/americas/7970471.stm|title=Major cyber spy network uncovered|publisher=BBC News|date=29 March 2009|accessdate=2009-03-30}}
  • {{citation|url=http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/20090329/China_Hackers_090329/20090329?hub|title=SciTech Cyber spy network 'smoking gun' for China: expert|publisher=CTV Canada|date=March 29, 2009|accessdate=2009-03-30}}
  • {{citation|url=https://nationalpost.com/news/story.html?id=1440426 |title=Canadian researchers uncover vast Chinese cyber spy network |author=Kim Covert |publisher=Canwest News Service |periodical=National Post, Don Mills, Ontario, Canada |date=March 28, 2009 |format= }}{{dead link|date=September 2016|bot=medic}}{{cbignore|bot=medic}}
  • {{citation|url=http://news.bbc.co.uk/2/hi/asia-pacific/7740483.stm|title=US warned of China 'cyber-spying'|publisher=BBC News|date=20 November 2008|accessdate=2009-04-01}}
  • {{citation|url=http://www.newsweek.com/id/138520|title=Intelligence - Cyber-Spying for Dummies|author=Mark Hosenball|periodical=Newsweek|date=June 2, 2008}}
  • {{Cite web|last=Walton|first=Gregory|publication-date=April 2008|title=Year of the Gh0st RAT|url=http://www.beijing2008conference.com/articles.php?id=101|publisher = World Association of Newspapers |accessdate=2009-04-01}}
  • {{citation|url=http://news.bbc.co.uk/2/hi/europe/7266543.stm|title=German court limits cyber spying|publisher=BBC News|date=27 February 2008}}
  • {{citation|url=http://www.theaustralian.news.com.au/story/0,25197,22882854-2703,00.html|title=Chinese fury at cyber spy claims|author=Rowan Callick |author2=Jane Macartney|periodical=The Australian|date=December 7, 2007}}
{{refend}}

External links

  • Congress to Investigate Google Charges Of Chinese Internet Spying (AHN)
  • [https://web.archive.org/web/20080424011010/http://infowar-monitor.net/index.php Archive of Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)]
  • Combat/Counter Cyber Spying - [https://www.qccglobal.com/bug-sweeping-services/ Bug Sweeping]
{{Espionage}}{{Intelligence cycle management}}{{Portal bar|Internet|Intelligence}}

15 : Cybercrime|Cyberwarfare|Spyware|Types of espionage|Military intelligence collection|Computer security|Computer security procedures|Hacking (computer security)|Information sensitivity|Mass intelligence-gathering systems|National security|Sabotage|Security engineering|Social engineering (computer security)|Computing terminology

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/12 5:10:13