Tracking GhostNet: Investigating a Cyber ... - Nart Villeneuve
Tracking GhostNet: Investigating a Cyber ... - Nart Villeneuve
Tracking GhostNet: Investigating a Cyber ... - Nart Villeneuve
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
JR02-2009 <strong>Tracking</strong> <strong>GhostNet</strong> - PART THREE<br />
49<br />
the United States) for strategic purposes. Compromised proxy computers on Hainan Island, for<br />
example, could have been deployed as staging posts, perhaps in an effort to deliberately mislead<br />
observers as to the true operator(s) and purpose of the <strong>GhostNet</strong> system.<br />
The Significance of <strong>GhostNet</strong><br />
<strong>GhostNet</strong> is significant, as it does not appear to be a typical cybercrime network. The potential<br />
political fallout is enormous. But ultimately, the question of who is behind the <strong>GhostNet</strong> may<br />
matter less than the strategic significance of the collection of affected targets. What this study<br />
discovered is serious evidence that information security is an item requiring urgent attention at<br />
the highest levels. It demonstrates that the subterranean layers of cyberspace, about which most<br />
users are unaware, are domains of active reconnaissance, surveillance, and exploitation.<br />
Regardless of who or what is ultimately in control of <strong>GhostNet</strong>, its capabilities of exploitation and<br />
the strategic intelligence that can be harvested from it matter most. Indeed, although the Achilles’<br />
heel of the <strong>GhostNet</strong> system allowed us to monitor and document its far-reaching network of<br />
infiltration, we can safely hypothesize that it is neither the first nor the only one of its kind.