On June 1, 2009, messages with the heading ''China and Climate Change'' dropped into the email inboxes of five US State Department officers. The five officers, working in the Office of the Special Envoy for Climate Change, were involved in preparing for delicate bilateral climate change talks in Beijing in several days.
The email appeared to be from a respected economics columnist at a well-known US journal and contained information designed to be of particular and direct relevance to the five staff.
Attached to the email was a PDF file also titled ''China and Climate Change''. Unknown to the staff, lurking within this document was a piece of sophisticated malicious code (malware) known as Poison Ivy.
If the file was opened, a remote administration tool, or RAT, would slip onto the target's computer and allow the sender nearly complete control over the system.
''The event appears to be a targeted 'spear-phishing' [gleaning sensitive information via email] attempt and may be indicative of efforts to gather intelligence on the US's position on climate change issues,'' an officer with the department's cyber threat analysis division wrote in a secret State Department cable sent three weeks later.
While that intrusion attempt was blocked, it provides a glimpse of a shadow war being waged in cyberspace between hundreds of countries, as they at once take advantage of the massive and anonymous reach of the internet, and find themselves besieged by it.
And, according to a series of classified US diplomatic cables released by WikiLeaks since last year , China is leading the charge.
The revelations, in the ''cyber threat'' section of a regular State Department cable regarding security concerns during 2008 and 2009, reveal a previously unseen world of cyber spying and intrusion, all centred on one classically inspired US code phrase.
''Byzantine Hades … a cover term for a series of related computer network intrusions with a believed nexus to China, has affected US and foreign governments as well as cleared defense contractors since at least 2003,'' a cable on November 5, 2008, explains.
One of Australia's leading strategic experts, the Director of Sydney University's Centre for International Security Studies, Alan Dupont, says that despite the ongoing refusal of government to publicly discuss it, China clearly has been a major player in the world of cyber espionage for some time.
''The broad international view based on a fair bit of empirical evidence, is that China is one of the countries at the forefront of cyber attacks on other states, which it is doing for fairly obvious reasons - intelligence gathering, political and strategic advantage, and also for defensive purposes,'' Dupont says.
Another apparent reason behind China's cyber attacks includes the need to control the internet, which, as the so-called Arab Spring has shown, can be a powerful tool of destabilisation.
But until the release of the State Department cables, the public was left in an information void regarding exactly what the Chinese were up to.
In a November 2008 cable, a diplomat describes a recent conference held by the German domestic security agency, Bundesamt fur Verfassungsschutz (BfV).
There, the BfV briefed other countries on its analysis of the ''cyber threat posed by the People's Republic of China (PRC), which appears to mirror conclusions drawn by the US intelligence community,'' the diplomat noted.
''The BfV surmises the intention of PRC actors is espionage, and the primary attack vector used in their malicious activity is socially engineered email messages containing malware attachments and/or embedded links to hostile websites.''
The BfV told its top-secret audience that in the 12 months to October 2007 it had discovered 500 such operations conducted against a range of targets including military, economic, science and technology, commercial, diplomatic, research and development, as well as high-level government systems.
''The socially engineered email messages delivered to German computer systems were spoofed to appear to come from trusted sources and contain information targeted specifically to the recipient's interests, duties, or current events,'' the diplomat noted.
Either within the email, in an attachment or via a link to a website, there lurked sophisticated malware.
Such code either ''hoovered up'' classified information directly or installed an unseen program which allowed remote control of the system by the hacker.
Of particular interest was the suggestion that a spike in such activity was noticed immediately prior to German government or private industry negotiations involving Chinese interests.
It is understood that Australian intelligence agencies have also noticed similar spikes before delicate negotiations involving similar interests.
The cables also reveal that such activity has been happening for many years, with a cable from the US embassy in The Hague in October 2005 discussing ''recent cyber operations originating from China'' that were targeting US logistics and defence acquisition programs.
The increasing regard the Western world is giving cyber espionage was reinforced earlier this week, when Australia and the US announced they were adding cyber warfare to the 60-year-old ANZUS treaty.
While it was a positive sign that both governments are increasingly aware of the significance of the threat, it means that Australia's wagon is now firmly hitched to the US star.
And of course Australia is not immune. Earlier this year it was revealed that spies - suspected to be Chinese - hacked into the parliamentary computers of at least 10 federal ministers, including that of the prime minister and the minister of foreign affairs and defence.
While the government has tried to keep it quiet, the intrusion is understood to have led to several more intrusions which have comprised several important systems.
Both the head of ASIO, Director-General of Security David Irvine, and the Attorney-General Robert McClelland, have recently become more vocal about the cyber threat.
''It seems the more rocks we turn over in cyber space, the more we find,'' Irvine told business leaders in a speech in July.
''Electronic intelligence gathering is now a huge industry. It is being used against Australia on a massive scale to extract confidential information from governments, the private sector and ordinary individuals.''
In comments provided to The Saturday Age for this article, McClelland agreed with that assessment.
"Attacks are becoming increasingly more sophisticated and targeted. This ranges from your average email scam to full-blown cyber espionage and attacks on our systems,'' he said.
And though neither Irvine nor McClelland would admit it, it appears that knowledge of cyber espionage goes all the way to the top of the Chinese political system, according to a US State Department cable from the Beijing embassy in January 2010.
US diplomats spoke to several well-placed sources who revealed that persistent intrusions into Google's Chinese servers in 2009, dubbed Operation Aurora, had been overseen by two members of the Politburo Standing Committee, the most powerful decision-making body in China.
''[The source] stated that PRC operations against Google were 'one hundred per cent' political in nature,'' the cable stated.
One of those Politburo members, Li Changchun, had entered his own name in Google's worldwide site and found ''results critical of him. As a result Li believes Google is a 'tool' of the [US] being used to 'foment peaceful revolution in China'."
Another facet to the Chinese use of cyber espionage is the way it has co-opted its private sector into such activity.
In a cable from June 29, 2009, a Beijing-based State Department cyber security officer discussed the ''strong possibility the PRC is harvesting the talents of its private sector in order to bolster offensive and defensive computer network operations capabilities''.
But despite such mounting evidence linking China to state-sponsored cyber espionage, they maintain they play no role in such acts.
When The Saturday Age recently asked the Chinese embassy in Canberra about the allegations of cyber espionage, an embassy spokeswoman replied via email, saying that the Chinese government attached great importance to cyber security. ''The Chinese government staunchly opposes and fights in accordance with law any criminal activity including hacking that may cause damage to the internet and computer networks,'' she said.
''Hacker attack is an international issue, to which China also falls victim. The allegation that China is behind the hacker attack is a complete fabrication out of ulterior motives.''
It would, of course, be to do a disservice to hard-working cyber spies the world over to suggest the Chinese are the only ones involved in the latest iteration of The Great Game.
''All states are engaged in cyber activities for both defensive and offensive reasons, and China is no different,'' Dupont says. ''If you're asking who has the best cyber security capabilities, I would rank the United States, Britain, Israel, Russia ahead of China at this stage.''
Dupont also points to an important article in the US journal Foreign Affairs last year by then US deputy secretary of defence, William Lynn. In it he wrote that more than 100 foreign intelligence agencies are trying to hack US networks.
As internet usage grows - it has soared from about 360 million people in 2000 to more than 2 billion last year - so too does its usefulness to those seeking to influence world events.
A powerful example of Western intelligence agencies' involvement in such action was the sabotage last year of Iran's Natanz nuclear facility, part of a uranium enrichment program whose ultimate aim, the West believes, is to acquire nuclear weapons.
Following reports that the plant's uranium production had significantly dropped, in June 2010 security experts uncovered elements of a computer worm that had infiltrated the plant's command and control system and caused significant damage.
Named Stuxnet, it has since been labelled a ''game changer''. It is believed to have taken as long as a year to create, backed by impressive technical expertise and high-level intelligence gathering, and was even rumoured to have been tested in a mocked-up version of the Natanz facility.
Ralph Langner, a German computer security consultant and the first expert to assert that Stuxnet was designed to attack Natanz, said in September 2010 that the fingerprints of Israel's spy agency, Mossad, were all over its code.
If that wasn't significant enough, five months later and after further examination of the code, he told a conference that Mossad did not appear to have been the ''leading force'' behind Stuxnet.
''The leading force behind that is the cyber superpower. There is only one, and that's the United States,'' he said, before adding, ''fortunately, fortunately. Because otherwise, our problems would even be bigger.''
The events surrounding the WikiLeaks release of the US diplomatic cables themselves are proof of the growing ubiquity of the web, and how it is becoming increasingly fundamental to all manner of state control and individual dissent.
''The speed at which this morphed from a nuisance to a strategic threat has been staggering. It has really happened at warp speed, in a very brief period of time - probably during the last five years,'' Dupont says. ''Even experts are finding it difficult to keep up with the rate of change in the diversity and sophistication of cyber attacks.''