So what do the Chinese Government and the Rightwing mega-lobbying group calling itself the U.S. Chamber of Commerce have in common? Apparently, they are both interested in hacking into the computer networks of their perceived political opponents and appear to be using very similar techniques and tools to do so, as The Nation's Lee Fang reported on Monday.
A computer security expert cited by Fang notes "lots of overlap" between the recent documented Chinese military cyber hacks and tactics proposed for use by federal contractors working with the U.S. Chamber and their attorneys to discredit their enemies.
Readers of The BRAD BLOG will likely remember the emails hacked by Anonymous in February of 2011 revealing that three U.S. government defense contractors had been working with U.S. Chamber of Commerce attorneys from the Washington D.C. lobbying/law firm of Hunton & Williams to develop a $12 million scheme to target their political opponents --- such as unions and progressive organizations --- by hacking into their computer networks, infiltrating the groups, planting false information in hopes of discrediting them, and using other sophisticated computer tools developed for the "War on Terror" by the three cyber-security firms.
One of the perceived political opponents targeted by the Chamber, we would learn from the hacked emails, was I. Personal details about myself and my family showed up in both the emails and a PowerPoint presentation for the U.S. Chamber prepared by "Team Themis," the name used for the illicit project by the three government contractors, HBGary Federal, Palintir, and Berico.
Lee Fang, who was then a reporter for Think Progress, and Scott Keyes, who still is,originally broke the revelations from the hacked HBGary Federal emails there. A slide in one of the presentations prepared for the U.S. Chamber scheme described the effort to "Discredit, Confuse, Shame, Combat, Infiltrate [and] Fracture" the progressive organizations with online tools, hacking and other dirty tricks in order to "mitigate [the] effect of adversarial groups."
Another slide included a photograph of me, and other personal details meant to targetVelvetRevolution.us, a not-for-profit good government group (co-founded by The BRAD BLOG) which has long called for accountability for the Chamber and its mafia-like political tactics.
The news of the hack and its revelations quickly garnered front-page headlines in the U.S. and around the world as an international scandal, even as the Chamber denied having knowledge of the specific cyber-terror threat clearly being created on their behalf by the three defense contractors, and even as neither they nor their attorneys have yet to face any accountability for the scheme to terrorize public organizations and private individuals, such as myself and my family. An official Dept. of Justice investigation into the matter --- and even a brief attempt to do so by Democrats in Congress --- was no doubt crippled by both the enormous power of the Chamber, and the fact that it was the DoJ itself which had referred Bank of America to the very same defense contractors in a parallel scheme mirroring the Chamber's, as revealed by the same email hack. That scheme was being prepared to target perceived supporters of WikiLeaks at the time, including journalist Glenn Greenwald.
"[W]ho better to develop a corporate information reconnaissance capability than companies that have been market leaders within the DoD and Intelligence Community," read one of the proposals [PDF] created by "Team Themis," as delivered to the U.S. Chamber of Commerce's law firm Hunton & Williams.
In Monday's report at The Nation, Fang details how recent cyber attacks against U.S. interests, which appear to be emanating from the Chinese Military, mirror tactics used by the U.S. Chamber's thugs in the eventually aborted 2010/2011 attempt to pull off what Fang describes as "one of the most brazen political espionage efforts in recent memory."