SUBSCRIBERS

The tools of global spycraft have changed

And so has the world in which they are used

    • Protestors in Tel Aviv demanding the return of hostages kidnapped during Hamas' Oct 7 attack on Israel, which laid bare the consequences of intelligence failure.
    • Protestors in Tel Aviv demanding the return of hostages kidnapped during Hamas' Oct 7 attack on Israel, which laid bare the consequences of intelligence failure. PHOTO: REUTERS
    Published Wed, Jul 3, 2024 · 05:00 AM

    A FEW years ago, intelligence analysts observed that Internet-connected closed-circuit television cameras in Taiwan and South Korea were inexplicably talking to vital parts of the Indian power grid. The strange connection turned out to be a deliberately circuitous route by which Chinese spies were communicating with malware they had previously buried deep inside crucial parts of the Indian grid (presumably to enable future sabotage). The analysts spotted it because they were scanning the Internet to look for “command and control” (C2) nodes – such as cameras – that hackers use as stepping stones to their victims.

    The attack was not revealed by an Indian or Western intelligence agency, but by Recorded Future, a firm in Somerville, Massachusetts. Christopher Ahlberg, its boss, claims the company has knowledge of more C2 nodes than anyone in the world. “We use that to bust Chinese and Russian intel operations constantly.”

    It also has billions of stolen log-in details found on the dark web (a hard-to-access part of the Internet) and collects millions of images daily. “We know every UK company, every Chinese company, every Indian company,” says Ahlberg. Recorded Future has 1,700 clients in 75 countries, including 47 governments.

    Share with us your feedback on BT's products and services