06.02.2015 Views

Tracking GhostNet: Investigating a Cyber ... - Nart Villeneuve

Tracking GhostNet: Investigating a Cyber ... - Nart Villeneuve

Tracking GhostNet: Investigating a Cyber ... - Nart Villeneuve

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

JR02-2009 <strong>Tracking</strong> <strong>GhostNet</strong> - PART THREE<br />

49<br />

the United States) for strategic purposes. Compromised proxy computers on Hainan Island, for<br />

example, could have been deployed as staging posts, perhaps in an effort to deliberately mislead<br />

observers as to the true operator(s) and purpose of the <strong>GhostNet</strong> system.<br />

The Significance of <strong>GhostNet</strong><br />

<strong>GhostNet</strong> is significant, as it does not appear to be a typical cybercrime network. The potential<br />

political fallout is enormous. But ultimately, the question of who is behind the <strong>GhostNet</strong> may<br />

matter less than the strategic significance of the collection of affected targets. What this study<br />

discovered is serious evidence that information security is an item requiring urgent attention at<br />

the highest levels. It demonstrates that the subterranean layers of cyberspace, about which most<br />

users are unaware, are domains of active reconnaissance, surveillance, and exploitation.<br />

Regardless of who or what is ultimately in control of <strong>GhostNet</strong>, its capabilities of exploitation and<br />

the strategic intelligence that can be harvested from it matter most. Indeed, although the Achilles’<br />

heel of the <strong>GhostNet</strong> system allowed us to monitor and document its far-reaching network of<br />

infiltration, we can safely hypothesize that it is neither the first nor the only one of its kind.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!