What Is Cyber Spying?
Cyber spying is the practice of using computer networks in order to obtain information that is otherwise regarded as private. Cyber spying can take place on many different levels. For example, individuals may engage in cyber spying against another particular individual, or countries may use cyber spying as a form of espionage in order to obtain classified information from other countries.
-
Basic Definition
-
Cyber spying is essentially the same as normal spying except that cyber spying takes place over the Internet. By hacking into the target's computer network, or compromising their security through other means, cyber spies are able to intercept and download information that may be valuable, extremely private or related to national security.
Large Scale
-
When cyber spying takes place on a large level, for example between countries, the practice may be referred to as cyber espionage. Many countries around the world have intelligence agencies who engage in the practice of espionage in the name of national security. With the emergence of the Internet, many of these agencies now conduct routine surveillance on other countries by engaging in cyber spying or cyber espionage.
-
Operation Shady Rat
-
In August of 2011, a cyber spying operation nicknamed "Operation Shady Rat" was exposed by McAfee Security. Operation Shady Rat was a massive cyber spying effort thought to be perpetrated by China, as all targets involved in the operation were of interest to China. More than 70 agencies, governments and companies around the world are believed to have been infiltrated. In some instances the cyber spies may have had free access to information for several years.
Methods
-
The methods involved in cyber spying involve various levels of complexity. Cyber spying methods can be as simple as guessing a target's password and accessing their files without permission, or as complex as planting hidden code on a target's computer and having that computer automatically upload certain information to a remote server. Cyber spies use whatever means are at their disposal in order to infiltrate the desired target, including phishing schemes, computer hacking, key logging software and back doors to computer systems.
-
References
Resources
- Photo Credit Photos.com/PhotoObjects.net/Getty Images