It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The people who uncovered GhostNet, an extensive cyber espionage network that targeted the Tibetan exile community, are back with a sequel. Starting with an infected machine that was found during that investigation, an international team of researchers has uncovered a completely separate network that primarily targeted the Indian government, and turned up some classified documents that had been obtained by the hackers. By reconstructing the network, the team was able to trace things back to the hacking community in Chengdu, China.
Citizen Lab, which operates out of the University of Toronto's Munk Centre for International Studies, is one of many groups making software available that allows citizens in Iran to sign on to a server that gives them secure access to web pages anywhere, bypassing government restrictions while allowing access to services such as Twitter.
Q: What are the ways around these information blockades?
A: Speaking as Psiphon Inc.'s forward deployed Psi-Operator — I can tell you that we have an aggressive Twitter campaign currently in operation propagating our proxy nodes.
We are giving away what we call "right2know" nodes that "push" banned content to Iranians, and that they then can use to surf other banned content, without even signing up for an account. They can sign up if they choose and we're getting hundreds of people signing on — one a minute in the first hour-and-a-half we set up the first node.