OK

This is only a Preview!

You must Publish this diary to make this visible to the public,
or click 'Edit Diary' to make further changes first.

Posting a Diary Entry

Daily Kos welcomes blog articles from readers, known as diaries. The Intro section to a diary should be about three paragraphs long, and is required. The body section is optional, as is the poll, which can have 1 to 15 choices. Descriptive tags are also required to help others find your diary by subject; please don't use "cute" tags.

When you're ready, scroll down below the tags and click Save & Preview. You can edit your diary after it's published by clicking Edit Diary. Polls cannot be edited once they are published.

If this is your first time creating a Diary since the Ajax upgrade, before you enter any text below, please press Ctrl-F5 and then hold down the Shift Key and press your browser's Reload button to refresh its cache with the new script files.

ATTENTION: READ THE RULES.

  1. One diary daily maximum.
  2. Substantive diaries only. If you don't have at least three solid, original paragraphs, you should probably post a comment in an Open Thread.
  3. No repetitive diaries. Take a moment to ensure your topic hasn't been blogged (you can search for Stories and Diaries that already cover this topic), though fresh original analysis is always welcome.
  4. Use the "Body" textbox if your diary entry is longer than three paragraphs.
  5. Any images in your posts must be hosted by an approved image hosting service (one of: imageshack.us, photobucket.com, flickr.com, smugmug.com, allyoucanupload.com, picturetrail.com, mac.com, webshots.com, editgrid.com).
  6. Copying and pasting entire copyrighted works is prohibited. If you do quote something, keep it brief, always provide a link to the original source, and use the <blockquote> tags to clearly identify the quoted material. Violating this rule is grounds for immediate banning.
  7. Be civil. Do not "call out" other users by name in diary titles. Do not use profanity in diary titles. Don't write diaries whose main purpose is to deliberately inflame.
For the complete list of DailyKos diary guidelines, please click here.

Please begin with an informative title:

The New York Times has an alarming story on how Chinese hackers have been attacking the newspaper for the last four months--including infiltrating its computer systems, stealing corporate passwords for its reporters, and breaking into the e-mail accounts of two foreign bureau chiefs. The Chinese hack is apparently retaliation for a New York Times story, which found that relatives of China's prime minister had accumulated several billion dollars through sweetheart business dealings. This is an unacceptable break-in that attempts to chill making information available to the public.

This week we also learned that the US is escalating its investigation into the government sources for another explosive New York Times article on the Stuxnet computer virus that attacked Iran's nuclear reactors. This is also an unacceptable hacking (euphemistically called "monitoring") that attempts to chill getting information to the public.

Both of these intrusions--instigated by newspaper articles that provided "too much" information to the public that offended government actors--are wrong and have a chilling effect.

Intro

You must enter an Intro for your Diary Entry between 300 and 1150 characters long (that's approximately 50-175 words without any html or formatting markup).

Using so-called spy software designed to capture screen images from laptops of employees as they were being used at work or at home. The software tracked their keystrokes, intercepted their personal e-mails, copied the documents on their personal thumb drives and even followed their messages line by line as they were being drafted

Does this sounds like a computer attack done by Chinese hackers or US surveillance authorities?

The answer is that these methods have been used by both the Chinese (evidence points to the Chinese military) that hacked the New York Times and the US in hacking its own employees' e-mails, phone calls, and text messages--originating not just on their government computers, but on their private accounts as well.

Both are wrong.  Both have a chilling effect. Both evidence the vicious clampdown on any information that embarrasses a government, or worse, exposes its illegalities.

Cyberattacks are considered war crimes by both the Chinese and US governments, though both countries actively engage in using cyberwarfare against other nations and their own people.

Today's Times article states:

The mounting number of attacks that have been traced back to China suggest that hackers there are behind a far-reaching spying campaign aimed at an expanding set of targets including . . . activists and media organizations inside the United States. The intelligence-gathering campaign, foreign policy experts and computer security researchers say, is . . . about trying to control China’s public image, domestically and abroad.
The exact same thing can be said of the U.S., as Glenn Greenwald summarized so aptly:
The permanent US national security state has used extreme secrecy to shield its actions from democratic accountability. . . [T]hose secrecy powers were dramatically escalated in the name of 9/11 and the War on Terror, such that most of what the US government now does of any significance is completely hidden from public knowledge. Two recent events - the sentencing last week of CIA torture whistleblower John Kirikaou to 30 months in prison and the invasive investigation to find the New York Times' source for its reporting on the US role in launching cyberwarfare at Iran - demonstrate how devoted the Obama administration is not only to maintaining, but increasing, these secrecy powers.
Extended (Optional)

EMAIL TO A FRIEND X
Your Email has been sent.