Why China Hacks

Now we can see how Beijing wants to use the information it has been swiping.

.

Updated July 17, 2016 7:23 p.m. ET

Authoritarian governments often hack into U.S. computer systems, but it’s rare for Americans to learn exactly what those adversaries do with the information they steal. No one knows exactly how China will use the confidential personnel records of 20 million federal employees, or Vladimir Putin’s plans for Hillary Clinton’s emails.

But we now have one example, thanks to a New York Times report on the arrest in China of a Swede who ran a nongovernmental group training Chinese lawyers and judges hoping to build an independent judiciary:

“On the 10th day of Peter Dahlin’s captivity in a secret Beijing jail, Chinese state security officers sprang one of their big surprises—something he found even more astonishing than hearing a colleague being beaten in a room above his cell.

Peter Dahlin, a Swedish human-rights activist, in a coerced video confession aired by China Central Television earlier this year. PHOTO:ASSOCIATED PRESS

“They showed him a document about the organization he had started. . . . It appeared to have been prepared by the National Endowment for Democracy, a nonprofit group based in Washington that is largely funded by the U.S. Congress.”

The NED internal document, written for the endowment’s top officials, described the programs run by Mr. Dahlin’s China Urgent Action Working Group. Mr. Dahlin told the Times he had never seen the document before: “I realized it must have come straight from NED itself somehow.” His interrogators also showed him emails sent and received by his colleagues.


.

The target was well chosen by a regime so insecure it must suppress any effort to hold the ruling Communist Party accountable. President Reagan launched the National Endowment for Democracy in a speech to the British Parliament in 1982, proposing it as a way “to foster the infrastructure of democracy” around the world.

Mr. Dahlin is the only foreigner so far jailed in President Xi Jinping’s campaign against China’s human-rights lawyers. In an unprecedented crackdown, Beijing has arrested hundreds of lawyers for bringing cases to challenge the actions of Communist officials. Mr. Dahlin said his interrogators seemed chiefly interested in how nongovernmental organizations like his operate, “how international funding operates, how you transfer funds, what’s the project plan.” He added: “They’re basically trying to understand this field so they can counter it.”

This case suggests a shift in China’s hacking strategy. Beijing has gone from amassing huge amounts of communications to deploying the information for its own ends. Most notably, Mr. Dahlin’s case shows that Beijing has decided it is sometimes even worth disclosing sources and methods. By showing it has access to U.S. documents, Beijing sends the message to other reformers in China that they too can be called in any time and accused of “endangering national security.”

Mr. Xi, who took office in 2012, has taken the harshest line against critics since Mao. A law passed in April that goes into effect next year puts the 7,000 nongovernment organizations operating in China under the control of the Ministry of Public Security and requires them to find a local “sponsor.”

Mr. Dahlin was jailed for three weeks and forced to read false confessions for broadcast on China’s state-run television, CCTV—the same official Communist Party broadcaster allowed to air on U.S. cable and satellite systems.

Reuters graphic image

Another coerced CCTV confession was extracted from Lam Wing-Kee, one of five Hong Kong-based booksellers who were taken over the border last year to be jailed in the mainland for selling books critical of Chinese officials. Beijing had denied snatching the men, but Mr. Lam last month confirmed that he had been forced out of Hong Kong against his will. “As a Hong Konger, I’m used to being a free man,” he said, explaining why he disclosed China’s abduction, which violates international law and Beijing’s promise to preserve Hong Kong’s freedom under the rubric “one country, two systems” when Britain gave up sovereignty in 1997.

Beijing has every reason to assume it will pay no price for its actions. The American Bar Association last year withdrew its offer to publish a book by Chinese lawyer Teng Biao,who was forced to emigrate to the U.S. after numerous arrests and beatings. The ABA told him in an email that it wouldn’t publish his “Darkness Before Dawn” because “there is concern that we run the risk of upsetting the Chinese government by publishing your book.” The association tried to explain away its shameful action as a business decision, but Beijing got the message that thuggish tactics work, even for associations that ostensibly exist to defend the rule of law.

The Obama administration, meanwhile, remains passive in response to China’s unprecedented cyberattacks. Mr. Dahlin won’t be the last victim.

http://www.wsj.com/articles/why-china-hacks-1468796525

Related:

For a primer on recent cyber intrusions, click here.

  1. How could the State Department Staff monitor her classified email flow? — She had her own server in her house with protections not even as good as on G-Mail….
  2. She has great respect for the State Department Staff but she lies to avoid taking responsibility herself and throws them under the bus.

Related:

 (Commentary from The Chicago Tribune)

Before the Democratic National Committee disclosed a major computer breach, U.S. officials informed both political parties and the presidential campaigns of Clinton, Donald Trump and Bernie Sanders that sophisticated hackers were attempting to penetrate their computers, according to a person familiar with the government investigation into the attacks.

Chinese and Russian hackers sought data from at least 4,000 individuals associated with U.S. politics — party aides, advisers, lawyers and foundations — for about seven months through mid-May, according to another person familiar with the investigations.

The thefts set the stage for what could be a Washington remake of the public shaming that shook Sony in 2014, when thousands of inflammatory internal e-mails filled with gossip about world leaders and Hollywood stars were made public. Donor information and opposition research on Trump purportedly stolen from the Democratic Party has surfaced online, and the culprit has threatened to publish thousands more documents.

 
Reuters

.

A hacker or group of hackers calling themselves Guccifer 2.0 posted another trove of documents purportedly from the DNC on Tuesday, including what they said was a list of donors who had made large contributions to the Clinton Foundation.

The Republican Party and the Trump campaign have been mostly silent on the computer attacks.

Rep. Debbie Wasserman Schultz, DNC Chair, after a Democratic presidential debate in Charleston, S.C. Photo: Andrew Burton/Getty Imgaes

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

One Response to “Why China Hacks”

  1. daveyone1 Says:

    Reblogged this on World Peace Forum.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


Follow

Get every new post delivered to your Inbox.

Join 1,042 other followers

%d bloggers like this: