Wikileaks, China and Google: What the hack tells us
Wikileaks has released a cable communication indicating China was responsible for hacking Google, but what does it tell us about security in general?
ANALYSIS The Chinese Politburo was behind the Google hack, according to a Wikileaks document released as part of the site's wide-ranging leaks of US Embassy cable communications.
A document, picked up by the New York Times, has claimed to cover communications from a Chinese contact telling the American Embassy in Beijing that the Politburo had ordered a hack attack on Google.
Google had previously claimed sources from within China were responsible for hacks on the search giant and other US companies.
So what have we learned, if anything, from this?
First off, has Wikileaks actually released anything that surprising? Given there were already suspicions over China's involvement it may not come as a surprise to many there is now a little more evidence to argue the nation's involvement in hacking Google.
What is more concerning is the reported wider-ranging plans and an operation by the Chinese Government to breach systems including those of Western allies and US businesses. This becomes even more alarming when the communications leak indicates the hacking work had been going on since 2002.
So it seems to have taken a while for people to take cyber warfare seriously. Although this year things have sparked into life with various public figures warning about the threat, does this leak not hint the security community was a little late in spreading the word about wars over the web?
Get a grip on security
Regardless of tardiness in that respect, the China Google case tells us governments need to get a hold of security as soon as possible.
"If the news that Chinese authorities were responsible for the Google hacks is true it highlights the growing importance that the Government must take cyber security more seriously," Ash Patel, country manager for UK and Ireland at Stonesoft, told IT PRO.
"Most of a country's critical systems are controlled by computers and as cyber criminals become better resourced it is easier for them to cripple a country by taking control of these, whether it be politically motivated or not."
Whilst the UK Government may have invested what appeared to be a significant chunk of money into fighting cyber crime with an additional 650 million, this "really isn't enough," according to Patel.
Indeed, it pales in comparison to the 20 billion that was discussed to renew the UK's Trident Nuclear deterrent programme, Patel added.
In This Article
The state of Salesforce: Future of business
Three articles that look forward into the changing state of Salesforce and the future of businessFree Download
The mighty struggle to migrate SAP to the cloud may be over
A simplified and unified approach to delivering Enterprise Transformation in the cloudFree Download
The business value of the transformative mainframe
Modernising on the mainframeFree Download
The Total Economic Impact™ Of IBM FlashSystem
Cost savings and business benefits enabled by FlashSystemFree Download