Technology Quarterly | New-look spooks

The tools of global spycraft have changed

And so has the world in which they are used, says Shashank Joshi

Illustration of two magnifying glasses with eyes inside on a background of digital files and pointing cursors.
Illustration: Claire Merchlinsky

A few years ago intelligence analysts observed that internet-connected cctv cameras in Taiwan and South Korea were inexplicably talking to vital parts of the Indian power grid. The strange connection turned out to be a deliberately circuitous route by which Chinese spies were communicating with malware they had previously buried deep inside crucial parts of the Indian grid (presumably to enable future sabotage). The analysts spotted it because they were scanning the internet to look for “command and control” (c2) nodes—such as cameras—that hackers use as stepping stones to their victims.

This article appeared in the Technology Quarterly section of the print edition under the headline “New-look spooks”

No way to run a country

From the July 6th 2024 edition

Discover stories from this section and more in the list of contents

Explore the edition