Cyber spying
Encyclopedia
Cyber spying or Cyber espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using illegal exploitation methods on the Internet, networks or individual computers through the use of cracking
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...

 techniques and malicious software including Trojan horses
Trojan horse (computing)
A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.-Malware:A destructive program that masquerades as a benign...

 and spyware
Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's...

. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

 and moles
Mole (espionage)
A mole is a spy who works for an enemy nation, but whose loyalty ostensibly lies with his own nation's government. In some usage, a mole differs from a defector in that a mole is a spy before gaining access to classified information, while a defector becomes a spy only after gaining access...

 or in other cases may be the criminal handiwork of amateur
Amateur
An amateur is generally considered a person attached to a particular pursuit, study, or science, without pay and often without formal training....

 malicious hackers and software programmers.

Cyber spying typically involves the use of such illegally gained access to secrets and classified information or illegally gained control of individual computers or whole networks for an unethical and illegal strategic
Strategy
Strategy, a word of military origin, refers to a plan of action designed to achieve a particular goal. In military usage strategy is distinct from tactics, which are concerned with the conduct of an engagement, while strategy is concerned with how different engagements are linked...

 advantage and for psychological
Psychological subversion
Psychological subversion is the name given by Susan Headley to a method of verbally manipulating people for information. It is similar in practice to so-called social engineering and pretexting, but has a more military focus to it...

, political
Subversion (politics)
Subversion refers to an attempt to transform the established social order, its structures of power, authority, and hierarchy; examples of such structures include the State. In this context, a "subversive" is sometimes called a "traitor" with respect to the government in-power. A subversive is...

 and physical subversion activities and sabotage
Sabotage
Sabotage is a deliberate action aimed at weakening another entity through subversion, obstruction, disruption, or destruction. In a workplace setting, sabotage is the conscious withdrawal of efficiency generally directed at causing some change in workplace conditions. One who engages in sabotage is...

. More recently, cyber spying invovles analysis of public activity on social networking sites like Facebook
Facebook
Facebook is a social networking service and website launched in February 2004, operated and privately owned by Facebook, Inc. , Facebook has more than 800 million active users. Users must register before using the site, after which they may create a personal profile, add other users as...

 and Twitter
Twitter
Twitter is an online social networking and microblogging service that enables its users to send and read text-based posts of up to 140 characters, informally known as "tweets".Twitter was created in March 2006 by Jack Dorsey and launched that July...


See also

  • Chinese Intelligence Operations in the United States
    Chinese intelligence operations in the United States
    The People's Republic of China has and is currently using a widespread effort to acquire U.S. military technology and classified information. To fulfill its long-term military development goals, the PRC uses a variety of methods to obtain U.S. technology; including espionage, the exploitation of...

  • Computer surveillance
    Computer surveillance
    Computer surveillance is the act of performing surveillance of computer activity, and of data stored on a hard drive or being transferred over the Internet....

  • Computer insecurity
    Computer insecurity
    Computer insecurity refers to the concept that a computer system is always vulnerable to attack, and that this fact creates a constant battle between those looking to improve security, and those looking to circumvent security.-Security and systems design:...

  • Cyber-security regulation
    Cyber-security regulation
    In the United States government, cyber-security regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cyber-security regulation is to force companies and organizations to protect their...

  • Cyberwarfare
  • Economic and Industrial Espionage
    Industrial espionage
    Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes...

  • Espionage
    Espionage
    Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

  • GhostNet
    GhostNet
    GhostNet is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an Advanced Persistent Threat...

  • Proactive Cyber Defence
    Proactive Cyber Defence
    Proactive Cyber Defence means acting in anticipation to oppose an attack against computers and networks. Proactive cyber defence will most often require additional security from internet service providers....

  • Surveillance
    Surveillance
    Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK