It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by DraconianKing
Just one genius could seriously give the US major problems now imagine a whole bunch of specially trained and well funded individuals with all sorts of toys and code to crush you with.
It used to take an entire nation to wage a war. Today it takes only one man. Taki Homosoto survived the hell of Hiroshima. Now, more than 50 years later, the time has come for the Americans to feel the flames of his revenge, using his personal army of terrorists and intelligence agents. The US Government and a network of somewhat reluctant allies - invisible and anonymous hackers join forces to battle this powerful enemy. The devastating climax of this one man's plan...this powerful, bitter survivor of ayamachi, The Great Mistake, is certain to bring global chaos and economic meltdown. A terrifying, thought provoking tale.
The report from Information Warfare Monitor stops short of specifically naming the Chinese government, or intelligence agencies within the government, as the culprit of these attacks. However, we do know that their intelligence agencies and law enforcement units have acted upon information obtained through GhostNet.
Another possible explanation is that there is a single individual or set of individuals (criminal networks, for example) who are targeting these high-value targets for profit. This can be in the form of stealing financial information or critical data that can be sold to clients, be they states or private entities. There are countless examples of large-scale fraud and data theft worldwide and numerous apparent instances of outsourcing to third parties of cyber-attacks and espionage, some of which the Information Warfare Monitor and its related research project, the OpenNet Initiative, have documented. GhostNet could very well be a for-profit, non-state venture. Even “patriotic hackers” could be acting on their own volition, or with the tacit approval of their government, as operators of the GhostNet.
Finally, it is not inconceivable that this network of infected computers could have been targeted by a state other than China, but operated physically within China (and at least one node in the United States) for strategic purposes. Compromised proxy computers on Hainan Island, for
example, could have been deployed as staging posts, perhaps in an effort to deliberately mislead observers as to the true operator(s) and purpose of the GhostNet system.
Originally posted by wonderworld
Doesn’t the modem go (in) to the main computer and (out) to the router? I may need help if I’m wrong about routers.
We know the Chinese government is communist therefore cyber espionage wouldn’t be too farfetched if only to spy on their own people.
Same as for the content servers, logging is turned off on the proxy and forwarding servers, residing in Truecrypt containers. The Russians have developed very clever software for proxy servers (in addition to the possibility of SSL tunneling and IP Forwarding). This proxy accepts incoming connections from the customers which are then tunneled to the Content Server in Germany - completely anonymous and unidentifiable. The link can even be configured for encryption. Result: the server in Germany NEVER APPEARS PUBLICALLY AND STAYS completely anonymously because he never appears with its IP except to the proxy servers that are configured to send the traffic back and forth like through a tunnel - using similar technology like large enterprise VPNs. I stress that this proxy servers are installed everywhere in the world and only consume a lot of traffic, have no special demands, and above all are completely unused.
Originally posted by mister.old.school
The report from Information Warfare Monitor stops short of specifically naming the Chinese government, or intelligence agencies within the government, as the culprit of these attacks. However, we do know that their intelligence agencies and law enforcement units have acted upon information obtained through GhostNet.