Wikileaks, China and Google: What the hack tells us

Wikileaks has released a cable communication indicating China was responsible for hacking Google, but what does it tell us about security in general?

ANALYSIS The Chinese Politburo was behind the Google hack, according to a Wikileaks document released as part of the site's wide-ranging leaks of US Embassy cable communications.

A document, picked up by the New York Times, has claimed to cover communications from a Chinese contact telling the American Embassy in Beijing that the Politburo had ordered a hack attack on Google.

Advertisement - Article continues below

Google had previously claimed sources from within China were responsible for hacks on the search giant and other US companies.

So what have we learned, if anything, from this?

First off, has Wikileaks actually released anything that surprising? Given there were already suspicions over China's involvement it may not come as a surprise to many there is now a little more evidence to argue the nation's involvement in hacking Google.

What is more concerning is the reported wider-ranging plans and an operation by the Chinese Government to breach systems including those of Western allies and US businesses. This becomes even more alarming when the communications leak indicates the hacking work had been going on since 2002.

So it seems to have taken a while for people to take cyber warfare seriously. Although this year things have sparked into life with various public figures warning about the threat, does this leak not hint the security community was a little late in spreading the word about wars over the web?

Advertisement - Article continues below
Advertisement - Article continues below

Get a grip on security

Regardless of tardiness in that respect, the China Google case tells us governments need to get a hold of security as soon as possible.

"If the news that Chinese authorities were responsible for the Google hacks is true it highlights the growing importance that the Government must take cyber security more seriously," Ash Patel, country manager for UK and Ireland at Stonesoft, told IT PRO.

"Most of a country's critical systems are controlled by computers and as cyber criminals become better resourced it is easier for them to cripple a country by taking control of these, whether it be politically motivated or not."

Whilst the UK Government may have invested what appeared to be a significant chunk of money into fighting cyber crime with an additional 650 million, this "really isn't enough," according to Patel.

Indeed, it pales in comparison to the 20 billion that was discussed to renew the UK's Trident Nuclear deterrent programme, Patel added.

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now

Most Popular

video conferencing

Taiwan becomes first country to ban Zoom amid security concerns

8 Apr 2020
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
cyber security

Microsoft gobbles up domain to keep it from hackers

8 Apr 2020