07.02.2014 Views

Beijing Olympics 2008: Winning Press Freedom - World Press ...

Beijing Olympics 2008: Winning Press Freedom - World Press ...

Beijing Olympics 2008: Winning Press Freedom - World Press ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Beijing</strong> <strong>Olympics</strong> <strong>2008</strong>: <strong>Winning</strong> <strong>Press</strong> <strong>Freedom</strong><br />

60<br />

Henderson and others have tried to demonstrate that what is true in the realm of human<br />

intelligence-gathering is reflected in Chinese information operations. That is, rather than<br />

assign a targeted goal for collection, the intelligence apparatus tends to rely on sheer<br />

weight of information to develop a global perspective. Experts have hypothesized that this<br />

is exactly the informal association the government and the Red Hacker Alliance share.<br />

The Chinese government appreciates the value of the Chinese computer underground and<br />

has made tentative contacts with them. From the government’s perspective, the hackers<br />

make excellent candidates for mounting information operations against overseas targets.<br />

They have demonstrated that they are creative, highly patriotic. They have the ability to<br />

launch sophisticated attacks, and are motivated to do so.<br />

That is not to suggest that every member of the Red Hacker Alliance has informal<br />

connections with the intelligence bureaucracy. Rather, there are probably very few<br />

members who have any dealings with the government. But this relationship is not<br />

straightforward or simple. At times, it must be uneasy and require a delicate balance of<br />

constraints and freedoms.<br />

A more detailed understanding of how the parties interact, especially where mutual<br />

interests converge, will enable us to uncover the complex cost-benefit analysis that the<br />

government must calculate when it allows the Red Hacker Alliance to operate within its<br />

borders. From the government’s perspective, the Chinese computer underground must<br />

bring benefits that outweigh their liabilities. Otherwise, the Red Hacker Alliance’s activities<br />

would be halted.<br />

There are very few indications that the government is now making any efforts to shut<br />

down the Red Hacker Alliance, surely a telling sign that the cost-benefit analysis is in the<br />

underground’s favor. So, if this is not a state-sponsored organization, what are the factors<br />

that make it worth the government’s while to allow the alliance to operate?<br />

The most obvious reason for the government’s tolerance of the Red Hacker Alliance is that<br />

it is likely that it receives valuable information. Thousands of attacks per day could surely<br />

fill in some of the gray areas of a composite intelligence picture. Furthermore, as a nonstate<br />

actor, the Red Hacker Alliance provides <strong>Beijing</strong> with plausible deniability. Even if<br />

freelance hackers could be positively identified, their actions are easily disavowed as those<br />

actions of patriotic youth, and certainly not of the government.<br />

In addition to intelligence collection, and the distinct possibility that the government and<br />

the alliance have financial ties, nationalist politics also bind the computer underground and<br />

the government together.<br />

The political sphere can be divided into two distinct categories, domestic and international.<br />

Domestic political hacking targets dissidents and separatist social movements found inside<br />

China - and extends to overseas supporters. The targets of these attacks are groups that<br />

are perceived to challenge the “unity of the motherland,” or question the legitimacy of the<br />

Communist Party, such as Falun Gong, the Tibet movement, and democracy activists and<br />

dissident networks such as Human Rights in China. Since at least 2002, dissident groups

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!