GhostNet: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
==Recommended Literature== | ==Recommended Literature== | ||
* [http://en.wikipedia.org/wiki/GhostNet Wikipedia entry] | * [http://en.wikipedia.org/wiki/GhostNet Wikipedia entry] | ||
* John Markoff, [http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&adxnnl=1&adxnnlx=1344535526-2wJ7Kus8PyKDSGO9NlesZQ Vast Spy System Loots Computers in 103 Countries], NY Times, Mar 28, 2009 | |||
* Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009 | * Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009 | ||
[[Category:Case Studies]] | [[Category:Case Studies]] |
Revision as of 13:07, 9 August 2012
This page is currently under construction. Check back for updates soon. |
Case Summary
Recommended Literature
- Wikipedia entry
- John Markoff, Vast Spy System Loots Computers in 103 Countries, NY Times, Mar 28, 2009
- Shishir Nagaraja & Ross Anderson, The snooping dragon: social-malware surveillance of the Tibetan movement, University of Cambridge Computer Laboratory Technical Report, March 2009