Definitions

Sorry, no definitions found. Check out and contribute to the discussion of this word!

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word spynet.

Examples

  • Even though the spynet was used primarily to support the Rebel Alliance, the Empire and the criminal underworld occasionally found the spynet useful for their own purposes.

    What are Bothans? 2006

  • The Bothan spynet is second to none, with operatives throughout the galaxy.

    What are Bothans? 2006

  • The researchers - based primarily at the Munk School of Global Affairs 'Citizen Lab at the University of Toronto and at SecDev Group, a consultancy in Ottawa - are the same ones who reported last March on another spynet, dubbed Ghost Net, that had breached computers of the Dalai Lama and more than 1,200 other systems at embassies, foreign ministries, news media outlets and nongovernmental organizations based primarily in South and Southeast Asia.

    Wired Top Stories Kim Zetter 2010

  • More than 1,295 computers in 103 countries were affected in some way by the spynet, and the researchers say it's the largest such ring ever discovered, in terms of the number of countries involved.

    Gizmodo 2009

  • "At the very least, the large percentage of high-value targets compromised by this network demonstrates the relative ease with which a technically unsophisticated approach can quickly be harnessed to create a very effective spynet."

    Ottawa Sun 2009

  • "At the very least, the large percentage of high-value targets compromised by this network demonstrates the relative ease with which a technically-unsophisticated approach can quickly be harnessed to create a very effective spynet," they warned.

    Fort Frances Times Online - 2009

  • At the very least, a large percentage of high-value targets compromised by this network demonstrate the relative ease with which a technically unsophisticated approach can quickly be harnessed to create a very effective spynet … These are major disruptive capabilities that the professional information security community, as well as policymakers, need to come to terms with rapidly.

    Nart Villeneuve 2009

  • Researchers discovered the spynet using, of all things, a Google search.

    Gizmodo 2009

  • "At the very least, the large percentage of high-value targets compromised by this network demonstrates the relative ease with which a technically unsophisticated approach can quickly be harnessed to create a very effective spynet."

    unknown title 2009

  • "At the very least, the large percentage of high-value targets compromised by this network demonstrates the relative ease with which a technically unsophisticated approach can quickly be harnessed to create a very effective spynet."

    Ottawa Sun 2009

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.