Cyber Spying

Contents:

This topic content was created by students during the Fall 2013 semester.

1 What is cyber spying?

Cyber spying is a cybercrime and is sometimes referred to as cyber espionage. It is when hackers target computers or IT networks in order to gain access to information that may be personal or classified. This information is typically in digital format and is somehow profitable for the hacker [5].

Cyber spying is an advanced concept. As technology has advanced so has the history of cyber spying events. The definition provided above can get a little confusing without understanding the basics. Understanding cyber spying is easier with the definitions of other computer lingo. Webopedia refers to cybercrime as “any criminal act dealing with computers and networks”[6]. This can include any crime such as slander, harassment, or hate crimes. However, it is most commonly associated with stealing of information from computers. The term hacker is often misconstrued. Webopedia defines hacker as “a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject” [6]. The word hacker is carrying a negative weight because of the media interpreting it wrong. Overtime, the new definition the word that has been created is “individuals who gain unauthorized access to computer systems for the purpose of stealing” [6]. This can also be referred to as cracker.

Hackers have several techniques and spyware programs that allow them to go unnoticed. Cyber spies can even be found using social media websites for harassment or other motives. The motives of hackers that commit cyber spying can be harmless or detrimental. Cyber spying can be considered a threat to both an individual and National Security. It can be used to gain information about people, organizations, and government agencies. Classified or private information can be used to steal passwords, credit card information, product designs, and military strategies. Cyber spying can be achieved by groups or individuals. Hackers can identify specific computers that have the information they want, and target them. Cyber spies can search through computer networks for years without being identified. Although it poses a frightening threat, there are ways to protect against cyber spying. The complex idea of cyber spying can be more closely examined in the categories, history, techniques, spyware, social media, threats, and prevention.

2 Cyber Spying Techniques

There are many ways for attackers to access someone’s digital information, and they rank from the simplest ones created from individuals with some programming skills, to the most advanced ones created by spying agencies. There are two major techniques the attacker can get this information. He can install a malware program and gain control of online accounts or the whole system. This is usually done by tricking the user to click on a link and install the malware. Another way is to intercept the connection by either wiretapping or cracking the encryption. Examples of some the attacks using links are spywares, phishing, spoofing, and fake advertisers which are used by hackers [16]. Other types of malware include backdoor programs, which open specific ports of the computer so the attacker can take control of the system. On the other hand, connection interception is used mainly by intelligence agencies like NSA. Undersea Cable tapping and XKeyscore system, a real-time Internet monitoring capability, are two of many spying techniques used by this agency [17].

Spyware has evolved with computers over time and can range to something one runs into everyday to something that is potentially very dangerous and intrusive. Spyware is a very general term and the most simple definition would be, software that is designed to gain personal information without first obtaining consent [11]. This software is usually come into contact through flaws in the web browser being used or by unknowingly downloading spyware.

2.1 Examples of Spyware:

  1. Tracking Cookies: This is the most common form of spyware that people will run into on the internet and is usually harmless. The main role of tracking cookies is for advertising, gaining information about what websites a user visits to present advertisements suited towards that specific user’s interests. [12]

  2. Keylogging: This is a growing problem on the internet as it is becoming more popular and is very intrusive. This spyware infects the computer by tricking users into downloading a program that is usually disguised as something harmless, but is in fact the keylogging program. This type of spyware is dangerous because it records the victims keystrokes which gives the hacker access to private information like passwords or social security numbers [13]

Being protected from spyware is actually easier than one may think. By periodically deleting cookies in a web browser, being knowledgeable of downloads, using safe websites, and using comprehensive virus protection the threat of contracting spyware is reduced to practically zero [11].

2.2 Spying in Social Media

With in the recent years cyber spying has taken a leap towards using social media sites like Twitter and Facebook. This spying can range from companies spying on your interests to use for effective ads to identity theft. Social media has also become a large component of cyber stalking. Cyber stalking is the repeated use of electronic communications to harass or frighten someone, for example by sending threatening e-mails [2]. Stalkers use data social media, like where they are and where they will be, to target and find victims. Occasionally social media has even been known to transmit information seeking malware.

2.3 Examples: Prism

In 2013 a contractor previously employed by the NSA named Edward Snowden leaked US government documents to the media that state that companies like Facebook and Youtube were giving information to a government program named PRISM that monitors posts, videos, pictures, and audio for threats from foreign targets[1].

2.4 Examples: Facebook Phishing Scams

There are a number of fake apps and links on the website Facebook that lead to site or downloads that ask for information or transmit malware through the installation of the fake app. On such post discovered in October 2013 stated that it would send the user a message when people visited their wall. The user then would launch a download which ended up being information seeking malware.[3]

2.5 Examples: Anthony Mantova

Anothony Mantova as of 2013 has been prosecuted several times for harassing 21 year old singer, Chloe Hopkins, on many occasions on Facebook and in real life.[3]

3 Threat to National Security

The threat of cyber spying extends beyond the personal risks to individual privacy and property. In this increasingly technological world, computers control and monitor everything from national corporations to resources and military operations. The emergence of international cyber espionage has resulted from global competition in business and political strife. Cyber spying infiltration of industrial secrets of U.S. corporations, national resource control systems, and military intelligence has originated from several foreign countries. However, recent media coverage has emphasized cyber threats based out of China and Russia.

3.1 China

The issue of international cyber spying has become such a significant threat that, “President Obama has identified cyber security as one of the most serious economic and national security challenges we face as a nation”. According to Jun Isomura,” a senior fellow at the Hudson Institute, a Washington think tank, China divides cyber into two target areas: political and military.” [7] He further explains that, “On the political side, China’s cyber efforts focus on the White House, State Department, Energy Department and the Office of the US Trade Representative, among others.” [7] On the military side, China’s “targets include the entire US defense community, including US intelligence and the defense industry.” [7] In February 2013, the US claimed that “China’s People’s Liberation Army had stolen data from 115 U.S. companies over a seven-year period.”[8] Although most of these companies were not part of the government, they did attack power companies that maintain electric power grids, gas lines, and public water works systems. [8] The US is having a hard time coming up with solid proof that attacks are coming from the Chinese, because hackers can often virtually use virus infected computers in other countries like a puppet to hack into the US systems.[9] Also, there are a few obstacles in initiating a cyber war with China. The first problem is that China has the world’s best Firewall protection – it has been often referred to as The Great Fire Wall. [7] Another reason is that China holds the US’s highest debt. [7] The technological advantages and economic leverage of China is a significant deterrent for the United States in confronting and contending with the cyber dilemma.

3.2 Russia

Apart from China, Russia is another large concern when it comes to national cyber security. Many of the methods that China employs to infiltrate the US’s databases, are used by the Russians. This not only doubles our threat level, but also makes it hard for us to correctly point the finger at the right perpetrator. The Director of National Intelligence said, “Any time you’re a threat, there are obviously two dimensions – one is capability and the other is intent.” He continues to say that “from a capability standpoint, the ability to wreak damage to the country, we’re more concerned with the potential of a nation-state, and obviously…Russia and China are probably the most capable.” [10]

4 Prevention

Today’s society has subsided to a media frenzy that is good yet often used for bad intentions. Cyber spying is a deliberate attempt to invade the privacy of and individual, company or agency. The use of the computer, iPhone, Smart Phone, and iPad, all have camera or the implementation of a web cam can be an open door for cyber spying. A cyber spy can actually access your computer by using a link and if opened the hacker could download access to your computer. There are steps to avoid a hacker’s ability to see activities in your home as well as the inability to burglarize. According to a Fox News broadcast program called Contact 6, a technology expert, Mr. Mark Chapman gave viewers practical tips for Cyber Prevention that included turning devices off when not in use, covering the cameras in your home and as a matter of fact he suggested the use of a post-it note sheet to cover a web camera. This is an inexpensive solution to avoid cyber spying in your home. [14]

Citizens should also be aware that Home Security Systems such as ADT have packages that include cameras as an added addition to monitor your home when you are not there by simply accessing their computers at work, cell phone, iPhones, etc. During the program it was also stated that if a person was caught cyber spying, the United States Attorney’s Office could impose a conviction of 5 years in prison. The FBI has also provided information on its website to inform citizens of cyber spying preventative measures that include keeping your firewall on for computers, installation of or updated Antivirus Software to prevent malicious software invasion from embedding in your computer because it automatically removes it from the computer. [15]

Preventions must be heeded and measures taken to safeguard families as well as companies and organizations. There are hackers who are innovative in technological skills and they will continue to attempt to deceive, and commit fraudulent crimes. Therefore, it is of utmost importance that when devices are not being used they should be turned off for your security against cyber spying.

5 Conclusion

In this increasingly digital age, we must remain aware of the risks of cyber espionage and how to prevent unwanted access to personal, business, and government computers. Cyber spying is stealing information from a computer or network system for economic, military, or political gain. Cyber spies use cracking or hacking techniques and malicious spyware such as tracking cookies and key-logging to gain access to private information. Cyber spying extends beyond risks to the individual, commercial, or agency users as countries competing in the global market attempt to steal trade, economic, and military secrets. Individuals, companies, and government agencies all need to use preventative techniques to ensure the safety of the information stored on their computers and the privacy of their homes. Cyber spies have many ways to access information stored on computers or networks or gaining access to digital cameras in the home and there are simple ways to prevent access to cyber spies.

6 References

  1. Gellman, Barton. “U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program.”*Washington Post* 06 Jun 2013, n. Web. 7 Nov. 2013. http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497\_story.html.

  2. “cyberstalking”. Oxford Dictionaries. Oxford University Press, n.d. Web. 09 November 2013. http://www.oxforddictionaries.com/us/definition/american\_english/cyberstalking.

  3. Stevenson, Alastair. “Bogus Facebook page uncovered spreading Infostealer malware.” V3.co.uk. AOP Digital, 10 Oct 2013. Web. 7 Nov 2013. http://www.v3.co.uk/v3-uk/news/2299894/bogus-facebook-page-uncovered-spreading-infostealer-malware.

  4. Vaas, Lisa, ed. “Twice-jailed stalker arrested for tagging Facebook photo of beauty queen with insult.” Naked Security. Sophos Ltd, 11 Oct 2013. Web. 7 Nov 2013. http://nakedsecurity.sophos.com/2013/10/11/twice-jailed-stalker-arrested-for-tagging-facebook-photo-of-beauty-queen-with-insult/.

  5. Janssen, Cory. “Cyberspying.” Techopedia. 2013. http://www.techopedia.com/definition/27101/cyberspying.

  6. “Cyber crime.” Webopedia. QuinStreet Inc, n.d. Web. 7 Nov 2013. http://www.webopedia.com/TERM/C/cyber\_crime.html.

  7. Minnick, Wendell. “Experts: Chinese Cyber Threat to US Is Growing.” Defense News. Gannett Government Media Corporation, 09 Jul 2013. Web. 7 Nov 2013. http://www.defensenews.com/article/20130709/DEFREG03/307090009/.

  8. Chakrabory, Barnini. “US officials addressing cyber threat at ‘highest levels’ with China, on heels of hacker report.” Fox News Politics. Fox News Network, LLC, 19 Feb 2013. Web. 7 Nov 2013. http://www.foxnews.com/politics/2013/02/19/us-raising-highest-levels-cyber/.

  9. Flook, Kara. “Russia and the Cyber Threat.” AEI Critical Threats. AEI Critical Threats Project, 13 May 2009. Web. 7 Nov 2013. http://www.criticalthreats.org/russia/russia-and-cyber-threat.

  10. O’Donnell, Kathy. “China, Russia Biggest Cyber Threats to US, Intel Committee is Told.” Main Justice. WDC Media LLC, 11 Apr 2013. Web. 7 Nov 2013. http://www.mainjustice.com/2013/04/11/china-russia-biggest-cyber-threats-to-us-intel-committee-is-told/.

  11. Microsoft, . “What is spyware?.” Microsoft: Safety & Security Center. Microsoft, n.d. Web. 7 Nov 2013. http://www.microsoft.com/security/pc-security/spyware-whatis.asp&xgt;.

  12. Brinkmann, Martin. “What is a tracking cookie?.” ghacks.net. gHacks Technology News, 17 Jul 2010. Web. 7 Nov 2013. http://www.ghacks.net/2010/07/17/what-is-a-tracking-cookie/.

  13. eHow Contributor, . “How to Find Keylogger Spyware Hidden on Your Computer.” eHow tech. Demand Media Inc, n.d. Web. 7 Nov 2013. http://www.ehow.com/how\_4916895\_keylogger-spyware-hidden-computer.html.

  14. Contact 6 Producer. “Contact 6: Preventing cyber spying.” Fox6 Now Milwaukee. Fox 6 News, 31 Jan 2013. Web. 7 Nov 2013. http://fox6now.com/2013/01/31/contact-6-preventing-cyber-spying/.

  15. FBI Contributor. “How to Protect Your Computer.” The FBI Federal Bureau of Investigation. U.S. Department of Justice, n.d. Web. 7 Nov 2013. http://www.fbi.gov/scams-safety/computer\_protect.

  16. Contributor. “Phishing and Spoofing.” LooksTooGoodToBeTrue.com. N.p., n.d. Web. 7 Nov 2013. http://www.lookstoogoodtobetrue.com/fraudtypes/phishing.asp&xgt;.

  17. Contributor. “Surveillance Strategies.” Domestic Surveillance Directorate. Domestic Surveillance Directorate, n.d. Web. 7 Nov 2013. http://nsa.gov1.info/surveillance/.