<p>When a series of events bring Chad Hunter and hot Agency super spy Sirena back together again, the action gets ramped up immediately. Chad has been hired by the Defense Department to develop a new weapon system based on the Hypershot rail gun system, with a scheduled test looming from a remote si
Tracking GhostNet : investigating a cyber espionage network
β Scribed by the SecDev Group ; Citizen Lab, Munk Centre for International Studies, University of Toronto
- Publisher
- Citizen Lab
- Year
- 2009
- Tongue
- English
- Leaves
- 53
- Series
- Information warfare monitor, JR02-2009.
- Edition
- English
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Introduction -- Rise of the cyber spies -- A focus on China -- Outline of report -- Part one: Context and background -- Alleged Chinese operations in cyberspace -- Applying the evidence-based approach to cyber attacks: the challenge of attribution -- Targeting Tibet -- Conduct of the investigation -- Phase 1: Field investigation -- Phase 2: Identifying command and control servers -- Part Two: Tracking Ghostnet -- Read more...
Summary --
Introduction --
Rise of the cyber spies --
A focus on China --
Outline of report --
Part one: Context and background --
Alleged Chinese operations in cyberspace --
Applying the evidence-based approach to cyber attacks: the challenge of attribution --
Targeting Tibet --
Conduct of the investigation --
Phase 1: Field investigation --
Phase 2: Identifying command and control servers --
Part Two: Tracking Ghostnet --
Phase I: Field investigation --
Targeted malware, previous research --
Information Warfare Monitor field research --
Office of His Holiness the Dalai Lama --
Tibetan Government-in-Exile --
Offices of Tibet --
Drewla --
Phase 2: Identifying command and control servers --
List of infected computers --
Sending commands --
Command results --
Methods and capabilities --
Analysis of list of infected computers --
Methodology --
Selected infections --
Infection timeline --
Part Three: Investigating GhostNet: conclusions --
Alternative explanations --
Attribution --
The significance of GhostNet --
Part Four: About the Information Warfare Monitor.
π SIMILAR VOLUMES
The advent of cyberspace has led to a dramatic increase in state-sponsored political and economic espionage. This monograph argues that these practices represent a threat to the maintenance of international peace and security and assesses the extent to which international law regulates this conduct.
The advent of cyberspace has led to a dramatic increase in state-sponsored political and economic espionage. This monograph argues that these practices represent a threat to the maintenance of international peace and security and assesses the extent to which international law regulates this conduct.
<span>CYBER INVESTIGATIONS</span><p><span>A classroom tested introduction to cyber investigations with real-life examples included</span></p><p><span>Cyber Investigations</span><span> provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a r
<p>Moscow Racetrack is the story of the disillusioned Teacher, a habituΓ© of the track, who one day lucks into big winnings. The KGB, who already had their eye on the Teacher because of his anti-Soviet essays on Russian history that are circulating in samizdat, sends the lucky winner and his pal to P