GhostNet: es una red internacional de espionaje

"The New York Times" se hace eco de un estudio de la Universidad de Toronto que dice que esta red de espionaje informático ha logrado penetrar en ordenadores de Gobiernos, embajadas, organizaciones de defensa de los derechos humanos y medios de comunicación, entre otras instituciones, en 103 países.
"Munk Center for International Studies" de la universidad de Toronto, autor del informe dice que la mayoría de los ordenadores infectados pertenece a países y oficinas diplomáticas del Sudeste Asiático, taiwanesas, indias y tibetanas.
El origen de esta investigación está relacionado conla petición de la oficina del Dalai Lama en Dharamsala (norte de laIndia) para que los expertos analizaran su red de ordenadores, dondehabían sido sustraídos virtualmente documentos y cuyos micrófonos ycámaras web eran activados mediante control remoto.

Si haces clic en el nombre "Munk Center for International Studies" te enlazo a la web oficial (en inglés). Aquí tienes el informe(inglés):

Tracking GhostNet: Investigating a Cyber Espionage Network
Tracking GhostNet: Investigating a Cyber Espionage Network The SecDev Group This report documents the GhostNet - a suspected cyber espionage network of over 1,295 infected computers in 103 countries, 30% of which are high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs.The capabilities of GhostNet are far-reaching. The report reveals that Tibetan computer systems were compromised giving attackers access to potentially sensitive information, including documents from the private office of the Dalai Lama. The report presents evidence showing that numerous computer systems were compromised in ways that circumstantially point to China as the culprit. But the report is careful not to draw conclusions about the exact motivation or the identity of the attacker(s), or how to accurately characterize this network of infections as a whole. The report argues that attribution can be obscured.The report concludes that who is in control of GhostNet is less important than the opportunity for generating strategic intelligence that it represents. The report underscores the growing capabilities of computer network exploitation, the ease by which cyberspace can be used as a vector for new do-it-yourself form of signals intelligence. It ends with warning to policy makers that information security requires serious attention.