GCHQ Spies Used Fake LinkedIn and Salshdot WebPages to Target Telecom Engineers

Nov 11 2013, 5:33am CST | by , in News | Technology News

GCHQ Spies Used Fake LinkedIn and Salshdot WebPages to Target Telecom Engineers
Image Credit: GCHQ

When Belgacom’s engineers turned on their LinkedIn pages, they hardly noticed the fact that they were being spied upon. GCHQ spies had used fake LinkedIn and Slashdot web pages to target these individuals.

Malware on the site implanted by specialized GCHQ spies was used to infiltrate the activities of Belgacom’s engineers. It had long been common knowledge thanks to Edward Snowden’s whistle blowing activities that Belgacom was being spied upon by GCHQ. A form of technology known as the Quantum Insert was employed to penetrate the Belgian telecommunications agency’s system. 

The original plan was known as Operation Socialist by the GCHQ. And it especially targeted Belgacom. This all is part of an exclusive British agency termed MyNOC. These initials stand for “My Network Operations Center”. It is a sort of hackers’ paradise. And it even keeps the Royal Family abreast of all the clandestine spying activities it takes part in. 

Mobile hubs have especially been a target for spying agencies. While it is slightly more difficult to gain access to these networks, they also lend far more information than other data channels. Full usage of GRX routers enables the eavesdropping to take place unawares. 

The fact that innocent people are being observed makes for a shocking discovery. LinkedIn could not possibly have allowed access to those who use its services. Spokespersons at GCHQ meanwhile did not have anything to say in response to a query. The plan of this master spying agency extends to the inclusion of all mobile devices wherever they may be and at whichever time possible. This is a scary scenario indeed!   

Source: SpiegelOnline

Leave a Comment

You May Also Like


Share this Story

Follow Us
Follow I4U News on Twitter
Follow I4U News on Facebook

Read the Latest from I4U News