Skip to main content

Givnology Wellness Arts
May you find yourself in the world…and may you enjoy the company!
Researchers in Toronto and Ottawa uncovered one of the world's largest networks of online spying, which they have dubbed the "Shadow Network."The Shadow Network targets organizations through seemingly safe means. Everything from Twitter accounts to Google groups and Yahoo e-mail accounts were used to transmit links or attachments that semed legitimate. Howerer, when people clicked on them$ their computer,would send out a beacon to a 'command and control' server that allowed the attacker to view and download files. Those files were dumped into drop zones, which the researchers were able to tap into from their own connections to the infected computers.

The spy ring had Indian national security files, including details of the Pechora missile system, an anti-aircraft, surface-to-air weapons project. Other documents contained data related to the Iron Dome missile system, and Project Shakti, an artillery combat system.

Documents related to military training schools were also found, along with the information on troops.

Almost every e-mail sent to or from the Dalai Lama"s office in 2009 has shown up on the files.

Sensitive data from 16 countries, such as visa applications by Canadian citizens, were also recovered. It is believed the hackers accessed those files through computers at India's embassies in Kabul, Dubai, Nigeria and Moscow, which were corrupted.

Such a collection of sensitive information represents a new era in online spying.

The Shadow Network structure is ingenious for its simplicity. Command servers which are used to issue instructions to computers-such as "send me all of your documents"-connected to victims through a variety of seemingly innocent networks such as Google groups, Yahoo e-mail and Twitter accounts. Those intermediaries were used to relay links or files to a recipient in a target organization. Once the user clicks on the link or opens an attachment in an infected e-mail, the computer relays a beacon to the command server, which instructs it to start sending files to a dump zone....

Some of this information is from "The Globe and Mail" newspaper,

Tuesday, April 6, 2010
Last edited {1}
Original Post

Replies sorted oldest to newest

Thank you for sharing this information Inda.

This is very scary.
I am very careful not to put any private in formation online. I avoid banking or shopping online. I think that people are putting far too much personal information on the internet. This seems to have become a way of life; just post all your family pictures and personal information for everyone to read. People do not care abot privacy any longer. This can be very dangerous, especially for young, inexperienced people.

Thank you yoko and Vicky.

I think humans are spending far too much time on all sorts of gadgets, and they are posting far too much private information. Humans are becoming robotic. People don't look at the trees or the flowers, they don't listen to the birds because they are constantly on some sort of machine. This is very sad.We have also given the crooks all sorts of sophisticated tools to work with, which will be very dangerous in the long run.
I read this information as well.

All kinds of people have the freedom to use whatever technology they like.

I see the next generation spending their whole life on either a cellphone or i-pod or whatever gadget they can lay their hands on. Nature no longer exists for them.

I myself do not put any personal information anywhere, and that includes facebook, twitter etc...

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of proxy servers[1]cracking techniques and malicious software including Trojan horses and spyware.[2][3] It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmer

From Wikipedia

On line spying has become much worse.

Add Reply

Content may be subject to copyright. See:
"..for purposes such as criticism, comment, news reporting, teaching, scholarship, or research.."

If you wish to contact us or join, Please go to our E-Learning site and fill out the contact us form!

Follow Givnology on Twitter

Submit Site - Web Site Promotion Submit Your Site To The Web's Top 50 Search Engines for Free! Search Engine Submission and Internet Marketing Search Engine Submission & Optimization
Submitshop LAUNCH FREE and FAST Search Engine SubmissionLiving Well Blogs - Blog Catalog Blog Directory

WWW Givnology

Link copied to your clipboard.