Israeli Trojan Horse: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(Created page with "{{Header_Message}} ==Case Summary== In 2005, a couple were arrested in Britain on charges of creating a Trojan horse key logger and installing it on systems at dozens of site...")
 
No edit summary
Line 8: Line 8:
* BBC, [http://news.bbc.co.uk/2/hi/middle_east/4594255.stm Israeli firms 'ran vast spy ring'] , May 31, 2005.
* BBC, [http://news.bbc.co.uk/2/hi/middle_east/4594255.stm Israeli firms 'ran vast spy ring'] , May 31, 2005.
* Bob Sullivan, [http://www.msnbc.msn.com/id/8145520/ Israel Espionage Case Points to New Net Threat], Jun 9, 2005.
* Bob Sullivan, [http://www.msnbc.msn.com/id/8145520/ Israel Espionage Case Points to New Net Threat], Jun 9, 2005.
[[Category:Case Studies]]

Revision as of 11:08, 8 August 2012

This page is currently under construction. Check back for updates soon.

Case Summary

In 2005, a couple were arrested in Britain on charges of creating a Trojan horse key logger and installing it on systems at dozens of sites by way of CD-ROMs containing what was purported to be a business proposal. This has been described as the largest industrial espionage case in Israeli history. The espionage activity was primarily targeted at competitors to the clients of three private investigation firms, at a cost of approximately $4,000 per compromised computer. Eighteen people were arrested and questioned in the case; however, it was primarily just a couple and their 17-year-old son who were responsible for software production, distribution, and data collection services.

(Summary from Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, National Academy of Science, 2009. pp351-2)

Recommended Literature