The era of cyberespionage. Yawn.

Google’s January investigation into Chinese hacking of over twenty companies and the emails of dozens of human rights activists has highlighted an increasingly potent form of espionage: "Cyber espionage is the great equalizer. Countries no longer have to spend billions to build globe-spanning satellites to pursue high-level intelligence gathering, when they can do so via ...

AFP/AFP/Getty Images
AFP/AFP/Getty Images
AFP/AFP/Getty Images

Google's January investigation into Chinese hacking of over twenty companies and the emails of dozens of human rights activists has highlighted an increasingly potent form of espionage:

"Cyber espionage is the great equalizer. Countries no longer have to spend billions to build globe-spanning satellites to pursue high-level intelligence gathering, when they can do so via the web..."

Google’s January investigation into Chinese hacking of over twenty companies and the emails of dozens of human rights activists has highlighted an increasingly potent form of espionage:

"Cyber espionage is the great equalizer. Countries no longer have to spend billions to build globe-spanning satellites to pursue high-level intelligence gathering, when they can do so via the web…"

That is from a joint report released today by the Information Warfare Monitor and Shadowserver Foundation called "Shadows in the Cloud". It details how China-based hackers stole secret documents from the Indian Defense Ministry, the Dalai Lama’s offices and the U.N over the past year. Although the report acknowledges no Chinese government link to what they dub the "Shadow Network," the information harvested is unlikely to be of much benefit to individuals. It includes secret assessments of India’s security in regions bordering Tibet, Bangladesh and Myanmar; missile systems; information on the domestic Maoist insurgency; and embassy assessments of Indian relations with West Africa, Russia, former Soviet republics and the Middle East.

Reuters neatly summarizes the report’s conclusions into how the attackers operated:

"The cyber-spies used popular online services, including Twitter, Google’s Google Groups and Yahoo mail, to access infected computers, ultimately directing them to communicate with command and control servers in China"

Although the Chinese government has denied any involvement and made clear that it views hacking as an international crime, it will be interesting to see if it investigates such hacker networks operating from its territory. There is surely enough evidence to do so. On the other hand, it is no secret that the U.S. also hosts a large number of the world’ cybercriminals; a recent report from Symantec’s Message Labs showed that while the bulk of the world’s targetted email attacks (28 percent) originate in China, 14 percent originate in the U.S.

In fact, since the Google-China debacle exploded, grievances in the American media have seemed to focus on freedom of speech and freedom from censorship rather than on issues of espionage. The Indian press also seems somewhat unconcerned — the report has gotten little attention there and the Chinese government has brushed it off as media hype. It just seems that all parties are resigned to the fact, at least tacitly, that this is the way things work nowadays.

Kayvan Farzaneh is an editorial researcher at Foreign Policy.

More from Foreign Policy

A Panzerhaubitze 2000 tank howitzer fires during a mission in Ukraine’s Donetsk region.
A Panzerhaubitze 2000 tank howitzer fires during a mission in Ukraine’s Donetsk region.

Lessons for the Next War

Twelve experts weigh in on how to prevent, deter, and—if necessary—fight the next conflict.

An illustration showing a torn Russian flag and Russian President Vladimir Putin.
An illustration showing a torn Russian flag and Russian President Vladimir Putin.

It’s High Time to Prepare for Russia’s Collapse

Not planning for the possibility of disintegration betrays a dangerous lack of imagination.

An unexploded tail section of a cluster bomb is seen in Ukraine.
An unexploded tail section of a cluster bomb is seen in Ukraine.

Turkey Is Sending Cold War-Era Cluster Bombs to Ukraine

The artillery-fired cluster munitions could be lethal to Russian troops—and Ukrainian civilians.

A joint session of Congress meets to count the Electoral College vote from the 2008 presidential election the House Chamber in the U.S. Capitol  January 8, 2009 in Washington.
A joint session of Congress meets to count the Electoral College vote from the 2008 presidential election the House Chamber in the U.S. Capitol January 8, 2009 in Washington.

Congrats, You’re a Member of Congress. Now Listen Up.

Some brief foreign-policy advice for the newest members of the U.S. legislature.