Suppose that the United States government learned that a foreign newspaper planned to run a series of (true) articles that, in the judgment of its intelligence establishment, had the potential to create great collateral damage and hurt the ability of the president to prosecute its agenda. Any government in that position with that mindset would almost certainly order its intelligence apparatus to try to obtain advance notice about the content of the article as well as information that could be used to discredit the authors.
Although the U.S. government now regularly trolls through the transactional records of reporters to ferret out leaks (and also to potentially chill serious reporting on national security issues," the U.S. is not China in many ways; it would be hard to see how a president could order a cyber attack to protect his family from a reputational smear. But the political system in China is not a representative democracy; there is no tradition of press freedom; the government is much more fragile. So IF you're an intelligence analyst, it is, from your perspective, quite rational to see a New York Times expose about the president's ill-begotten money as a legitimate threat to the country.
What fascinates me about the exploits of officially sanctioned Chinese cyber attacks is how limited they are. The Times found that the hackers were interested in and only interested in what the Times would say about the Wen family. "Experts found no evidence that the intruders used the passwords to seek information that was not related to the Wen family." Read that again. Based on what our government tells us, we think the Chinese government's hacking efforts are indiscriminate. But they're not. The net is sometimes wide, but the hackers seem to play by their own peculiar set of rules. If a person has information that pertains to the security environment as perceived by the Chinese government, then they're fair game for computer network attack.
The United States plays by these informal rules too. Our NSA has probably broken into the email accounts of journalists and human rights activists in other countries. The lawyers who supervise these covert operations probably make sure to place limitations on what our cyber-spies are able to gather and collect, all in the name of limiting both the footprint of the attack and the self-inspection that comes with snooping on anyone's email.
Chinese cyber espionage is scary. It's also not surprising. The U.S. cannot easily claim the moral high ground.
THE WEEK'S AUDIOPHILE PODCASTS: LISTEN SMARTER
- How Ronald Reagan turned America into a nation of children
- The Nazi smart bomb that inspired China's most dangerous weapon
- Why Mitt Romney is perfectly poised for a comeback in 2016
- The crusade against Iraq War supporters has forgotten someone: Hillary Clinton
- 8 things the world's most extraordinary survivors can teach you about resilience
- Why is the West so afraid of Islam?
- Here's the schedule very successful people follow every day
- This week I learned the moon might be littered with dinosaur fossils, and more
- 7 grammar rules you really should pay attention to
- Why scientists can't kill HIV
Subscribe to the Week