Skip to Content

Vast Web Espionage Network Discovered

By using botnets, politically motivated attackers can enjoy relative impunity.
March 30, 2009

More than 1,200 computers worldwide have reportedly been infected by what appears to be a politically motivated spy system. Researchers from the Munk Centre for International Studies at the University of Toronto discovered the sprawling “Ghostnet” after being asked to analyze computers belonging to the office of the Dalai Lama. According to Nart Villeneuve, a PhD student and one of the researchers involved:

Close to 30 [percent] of the infected hosts are considered high-value and include computers located at ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The investigation was able to conclude that Tibetan computer systems were compromised by multiple infections that gave attackers unprecedented access to potentially sensitive information, including documents from the private office of the Dalai Lama.

Although some have attributed the spying to the Chinese government, the Toronto researchers say they can’t definitely pin the system to any particular group, even if it seems likely that it’s being run by people based in China.

That sort of uncertainty is the way of the future. In a recent story about politically motivated denial of service attacks, I wrote:

A big problem with these politically motivated attacks, according to Jose Nazario, manager of security research for Arbor Networks, is that it’s particularly hard to pinpoint who is really responsible. While it’s easy to determine which botnet is the source of an attack, it’s far harder to determine who might be paying for the attack. This is a big worry for governments looking for redress or retaliation.

The Internet–amazing, distributed technology that it is–offers plausible deniability for those who would take advantage of its darker side. The University of Toronto researchers noted that lack of clarity surrounding international law also makes it hard to pursue the investigation to a satisfying conclusion. Whether used for denial-of-service attacks or spying, the relative legal immunity these botnets enjoy will make them a tempting tool for unscrupulous organizations for a long time to come. Villeneuve concludes:

Regardless of who or what is ultimately in control of GhostNet, it is the capabilities of exploitation, and the strategic intelligence that can be harvested from it, which matters most. Indeed, although the Achilles’ heel of the GhostNet system allowed us to monitor and document its far-reaching network of infiltration, we can safely hypothesize that it is neither the first nor the only one of its kind.

Deep Dive


Our best illustrations of 2022

Our artists’ thought-provoking, playful creations bring our stories to life, often saying more with an image than words ever could.

How CRISPR is making farmed animals bigger, stronger, and healthier

These gene-edited fish, pigs, and other animals could soon be on the menu.

The Download: the Saudi sci-fi megacity, and sleeping babies’ brains

This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. These exclusive satellite images show Saudi Arabia’s sci-fi megacity is well underway In early 2021, Crown Prince Mohammed bin Salman of Saudi Arabia announced The Line: a “civilizational revolution” that would house up…

10 Breakthrough Technologies 2023

Every year, we pick the 10 technologies that matter the most right now. We look for advances that will have a big impact on our lives and break down why they matter.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.