National Security & Defense

Want to Read Hillary’s E-mails? Ask China.

(Photo Illustration: NRO)

‘We have a lot of information about people, and that is something that our adversaries want.”

That’s how Donna Seymour, an Office of Personnel Management (OPM) official recently described the OPM hacking to a reporter for the Washington Post. As we found out yesterday, in April, Chinese hackers intruded OPM networks and potentially acquired the personal information of 4 million U.S. government employees.

So how did this happen? Well, according to an OPM press release, the agency has been upgrading its network security over the past year. That said, yesterday’s press release also notes that it was only after the April hacking that OPM focused on “restricting remote access for network administrators . . . and deploying anti-malware software” against programs that might “compromise the network.” In short, OPM hasn’t been moving fast enough to prevent hacking.

Regardless, it makes sense that China was involved in the intrusion. For a start, China has exceptionally capable, experienced, and wide-ranging cyber-hacking forces. These units are experts at both physical access and remote penetration of network-security systems. Moreover, China has a penchant for attacking the OPM. In July last year, the New York Times reported on China’s hacking of OPM information on applicants for top-secret security clearances. That the OPM didn’t urgently upgrade its security after that 2014 incident is inexcusable. We’ve paid the price in our damaged national security.

RELATED: Obama Needs to Respond to the Chinese Government Hack — and All Their Other Provocations, Too

So China appears to have scored a major win here. John Schindler, a former NSA counter-intelligence official and the author of the 20 Committee strategy blog told me that OPM information can be “vital to recruiting or compromising” U.S. government officials. The agency gathers “extensive details of their personal lives, their finances, their families, their career highs and lows,” he said. “In short, everything you would never want your enemy to know about you – from a counterintelligence viewpoint, this breach represents a true nightmare scenario.”

By finding U.S. officials with personal or professional difficulties, China can target them for recruitment.

Schindler’s point is well made. After all, it’s not hard to guess why hackers are so interested in the OPM. By finding U.S. officials with personal or professional difficulties, China can target them for recruitment. And China has a record here. In recent years, China has worked hard to recruit Westerners — both in the United States and in China. It does so because it wants people who have access (or who will have access) to steal information for China’s military and industrial development.

#related#But the significance of this incident isn’t only that information has been stolen. It’s that it reveals massive flaws in the broader American policy towards China. It proves that U.S. warnings to China over hacking have so far been utterly impotent. Seeing that his aggressive cyber-operations result only in occasional, unenforceable indictments from the U.S. Justice Department, President Xi Jinping simply keeps doubling down. Today, while he challenges America across the planet, Jinping is also challenging America in cyberspace. It’s a full-spectrum Chinese effort. And it’s uncontested by America.

Oh, and one final observation: If hackers can repeatedly breach American government servers, we should certainly assume that Jinping has also read Hillary Clinton’s e-mails.

Tom Rogan is a panelist on The McLaughlin Group and holds the Tony Blankley chair at the Steamboat Institute. He tweets @TomRtweets.

Tom Rogan — Tom Rogan is a columnist for National Review Online, a contributor to the Washington Examiner, and a former panelist on The McLaughlin Group. Email him at TRogan@McLaughlin.com

Most Popular

U.S.

The Gun-Control Debate Could Break America

Last night, the nation witnessed what looked a lot like an extended version of the famous “two minutes hate” from George Orwell’s novel 1984. During a CNN town hall on gun control, a furious crowd of Americans jeered at two conservatives, Marco Rubio and Dana Loesch, who stood in defense of the Second ... Read More
Film & TV

Why We Can’t Have Wakanda

SPOILERS AHEAD Black Panther is a really good movie that lives up to the hype in just about every way. Surely someone at Marvel Studios had an early doubt, reading the script and thinking: “Wait, we’re going to have hundreds of African warriors in brightly colored tribal garb, using ancient weapons, ... Read More
Law & the Courts

Obstruction Confusions

In his Lawfare critique of one of my several columns about the purported obstruction case against President Trump, Gabriel Schoenfeld loses me — as I suspect he will lose others — when he says of himself, “I do not think I am Trump-deranged.” Gabe graciously expresses fondness for me, and the feeling is ... Read More
Politics & Policy

Students’ Anti-Gun Views

Are children innocents or are they leaders? Are teenagers fully autonomous decision-makers, or are they lumps of mental clay, still being molded by unfolding brain development? The Left seems to have a particularly hard time deciding these days. Take, for example, the high-school students from Parkland, ... Read More