Marc Ambinder

How China justifies its cyber attacks

Suppose that the United States government learned that a foreign newspaper planned to run a series of (true) articles that, in the judgment of its intelligence establishment, had the potential to create great collateral damage and hurt the ability of the president to prosecute its agenda. Any government in that position with that mindset would almost certainly order its intelligence apparatus to try to obtain advance notice about the content of the article as well as information that could be used to discredit the authors.

Although the U.S. government now regularly trolls through the transactional records of reporters to ferret out leaks (and also to potentially chill serious reporting on national security issues," the U.S. is not China in many ways; it would be hard to see how a president could order a cyber attack to protect his family from a reputational smear. But the political system in China is not a representative democracy; there is no tradition of press freedom; the government is much more fragile. So IF you're an intelligence analyst, it is, from your perspective, quite rational to see a New York Times expose about the president's ill-begotten money as a legitimate threat to the country. 

What fascinates me about the exploits of officially sanctioned Chinese cyber attacks is how limited they are. The Times found that the hackers were interested in and only interested in what the Times would say about the Wen family. "Experts found no evidence that the intruders used the passwords to seek information that was not related to the Wen family." Read that again. Based on what our government tells us, we think the Chinese government's hacking efforts are indiscriminate. But they're not. The net is sometimes wide, but the hackers seem to play by their own peculiar set of rules. If a person has information that pertains to the security environment as perceived by the Chinese government, then they're fair game for computer network attack.

The United States plays by these informal rules too. Our NSA has probably broken into the email accounts of journalists and human rights activists in other countries. The lawyers who supervise these covert operations probably make sure to place limitations on what our cyber-spies are able to gather and collect, all in the name of limiting both the footprint of the attack and the self-inspection that comes with snooping on anyone's email.

Chinese cyber espionage is scary. It's also not surprising. The U.S. cannot easily claim the moral high ground.

Recommended

The end of the line for Boris Johnson?
Boris Johnson
Talking point

The end of the line for Boris Johnson?

U.S. strikes Iranian targets in Syria after drone attack kills U.S. contractor
U.S. forces in Hasaka, Syria
Flare Up

U.S. strikes Iranian targets in Syria after drone attack kills U.S. contractor

Why are U.S. troops still in Somalia?
An illustrated collage of U.S. troops, Somalia's outline, and palm trees
In depth

Why are U.S. troops still in Somalia?

Indian opposition leader Rahul Gandhi sentenced to 2 years over Modi quip
Rahul Gandhi
Modi operandi

Indian opposition leader Rahul Gandhi sentenced to 2 years over Modi quip

Most Popular

DeSantis' no good, very bad week
Ron DeSantis at a podium
Behind the scenes

DeSantis' no good, very bad week

Essential molecules for life may have been 'delivered' to Earth from space
Asteroid Ryugu.
alien invasion

Essential molecules for life may have been 'delivered' to Earth from space

U.S. housing prices fall for 1st time in 11 years
Home prices fall as sales rise
Mixed Messages

U.S. housing prices fall for 1st time in 11 years