GhostNet: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 7: | Line 7: | ||
* John Markoff, [http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&adxnnl=1&adxnnlx=1344535526-2wJ7Kus8PyKDSGO9NlesZQ Vast Spy System Loots Computers in 103 Countries], NY Times, Mar 28, 2009 | * John Markoff, [http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1&adxnnl=1&adxnnlx=1344535526-2wJ7Kus8PyKDSGO9NlesZQ Vast Spy System Loots Computers in 103 Countries], NY Times, Mar 28, 2009 | ||
* Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009 | * Shishir Nagaraja & Ross Anderson, [http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.pdf The snooping dragon: social-malware surveillance of the Tibetan movement], University of Cambridge Computer Laboratory Technical Report, March 2009 | ||
* [https://www.f-secure.com/weblog/archives/ghostnet.pdf Tracking GhostNet: Investigating a Cyber Espionage Network], Information Warfare Monitor, Mar 29, 2009 | |||
[[Category:Case Studies]] | [[Category:Case Studies]] |
Revision as of 13:19, 9 August 2012
This page is currently under construction. Check back for updates soon. |
Case Summary
Recommended Literature
- Wikipedia entry
- John Markoff, Vast Spy System Loots Computers in 103 Countries, NY Times, Mar 28, 2009
- Shishir Nagaraja & Ross Anderson, The snooping dragon: social-malware surveillance of the Tibetan movement, University of Cambridge Computer Laboratory Technical Report, March 2009
- Tracking GhostNet: Investigating a Cyber Espionage Network, Information Warfare Monitor, Mar 29, 2009