Beijing Olympics 2008: Winning Press Freedom - World Press ...
Beijing Olympics 2008: Winning Press Freedom - World Press ...
Beijing Olympics 2008: Winning Press Freedom - World Press ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Beijing</strong> <strong>Olympics</strong> <strong>2008</strong>: <strong>Winning</strong> <strong>Press</strong> <strong>Freedom</strong><br />
60<br />
Henderson and others have tried to demonstrate that what is true in the realm of human<br />
intelligence-gathering is reflected in Chinese information operations. That is, rather than<br />
assign a targeted goal for collection, the intelligence apparatus tends to rely on sheer<br />
weight of information to develop a global perspective. Experts have hypothesized that this<br />
is exactly the informal association the government and the Red Hacker Alliance share.<br />
The Chinese government appreciates the value of the Chinese computer underground and<br />
has made tentative contacts with them. From the government’s perspective, the hackers<br />
make excellent candidates for mounting information operations against overseas targets.<br />
They have demonstrated that they are creative, highly patriotic. They have the ability to<br />
launch sophisticated attacks, and are motivated to do so.<br />
That is not to suggest that every member of the Red Hacker Alliance has informal<br />
connections with the intelligence bureaucracy. Rather, there are probably very few<br />
members who have any dealings with the government. But this relationship is not<br />
straightforward or simple. At times, it must be uneasy and require a delicate balance of<br />
constraints and freedoms.<br />
A more detailed understanding of how the parties interact, especially where mutual<br />
interests converge, will enable us to uncover the complex cost-benefit analysis that the<br />
government must calculate when it allows the Red Hacker Alliance to operate within its<br />
borders. From the government’s perspective, the Chinese computer underground must<br />
bring benefits that outweigh their liabilities. Otherwise, the Red Hacker Alliance’s activities<br />
would be halted.<br />
There are very few indications that the government is now making any efforts to shut<br />
down the Red Hacker Alliance, surely a telling sign that the cost-benefit analysis is in the<br />
underground’s favor. So, if this is not a state-sponsored organization, what are the factors<br />
that make it worth the government’s while to allow the alliance to operate?<br />
The most obvious reason for the government’s tolerance of the Red Hacker Alliance is that<br />
it is likely that it receives valuable information. Thousands of attacks per day could surely<br />
fill in some of the gray areas of a composite intelligence picture. Furthermore, as a nonstate<br />
actor, the Red Hacker Alliance provides <strong>Beijing</strong> with plausible deniability. Even if<br />
freelance hackers could be positively identified, their actions are easily disavowed as those<br />
actions of patriotic youth, and certainly not of the government.<br />
In addition to intelligence collection, and the distinct possibility that the government and<br />
the alliance have financial ties, nationalist politics also bind the computer underground and<br />
the government together.<br />
The political sphere can be divided into two distinct categories, domestic and international.<br />
Domestic political hacking targets dissidents and separatist social movements found inside<br />
China - and extends to overseas supporters. The targets of these attacks are groups that<br />
are perceived to challenge the “unity of the motherland,” or question the legitimacy of the<br />
Communist Party, such as Falun Gong, the Tibet movement, and democracy activists and<br />
dissident networks such as Human Rights in China. Since at least 2002, dissident groups