Skip to main content

The context you need, when you need it

When news breaks, you need to understand what actually matters — and what to do about it. At Vox, our mission to help you make sense of the world has never been more vital. But we can’t do it on our own.

We rely on readers like you to fund our journalism. Will you support our work and become a Vox Member today?

Join now

Was the hack against the DNC an elaborate anti-Trump attack ad? Let’s talk about that.

If the hackers were expected, maybe the leaked opposition document was bait.

Rubber Masks Of Hilary Clinton And Donald Trump Manufactured In Japan
Rubber Masks Of Hilary Clinton And Donald Trump Manufactured In Japan
Tomohiro Ohsumi/Getty Images

Attacks against the computer networks of presidential campaigns and political parties by hackers operating out of Russia and China have become a traditional staple of election season, going back at least as far as 2008.

They’ve struck again in 2016, gaining access to the network of the Democratic National Committee and releasing a detailed opposition research document on the Republican Party’s presumptive nominee Donald Trump.

The basic theory behind these hacking attacks is simple: Governments of other countries want dirt that will be useful in dealing with the person who might be America’s next president.

Having read the table of contents of the leaked document and some of the coverage about it, I’m struck by a few things.

First, if you’ve paid any attention to the Trump campaign since the beginning, the document contains no meaningfully new revelations. It is, more or less, a collection of highlights drawn from negative stories about Trump’s business dealings, the lawsuits over Trump University, his treatment of and attitudes toward women, incendiary quotes from speeches and so on, all pulled together in a readable package.

Second, if anyone at the DNC had been thinking strategically, they would have anticipated — or, in fact, assumed — that a hack would come. That in mind, it would be smart to leave a certain amount of seemingly sensitive information vulnerable to be “found” by the attackers.

Let’s game the theory out a bit. If you know the hackers are coming, you know they’re going to be looking for data to steal. You can also use the opportunity to study the attackers’ methods and tricks, which is what the the New York Times did in 2013 when hackers from China breached its network.

Then, you can report the attack as a crime to the FBI, which it unquestionably is. That makes it a national news story. Then you wait.

We had only to wait about 24 hours after the first reports of the hacks before the headline-grabbing opposition document showed up on file-sharing networks, then on Gawker and The Smoking Gun for everyone to read.

Next, everyone who’s interested clicks through to read it to see if there are any juicy new revelations. In the process, they re-read all the negative things they’ve ever heard about Donald Trump, remember a few things they forgot and maybe learn about a few they didn’t know.

The document essentially becomes an elaborately staged 237-page attack advertisement. Smart, right? Even Trump himself believes a version of this theory.

Meanwhile, following the advice and counsel of seasoned security professionals, the DNC and/or the Hillary Clinton campaign have locked down their truly sensitive documents on encrypted hard drives and limited their access to a few very senior campaign or party operatives who use multi-factor authentication.

That’s what I’d like to imagine happened. I’m probably giving them too much credit for being creative. The professionals running the operations of our political campaigns can’t really be so dumb as to have left their most important information so readily unprotected, could they? Really?

Examples elsewhere aren’t encouraging. When Sony Pictures Entertainment was attacked by hackers working on behalf of North Korea, its network suffered from serious deficiencies that its own auditor had found and identified. You can read the emails of its most senior executives on Wikileaks. Its CEO now says he loves his fax machine.

The U.S. Government’s Office of Personnel Management was attacked by hackers in China and personal information on millions of federal employees, past and present, was taken. It served as the starkest proof yet that outside the national security establishment, the Federal government sucks at cyber security.

Yes, really. When it comes to securing their computers, like so many others, they probably are exactly that dumb.


Jeff Bezos on Donald Trump and the media

This article originally appeared on Recode.net.

See More:

More in Technology

Podcasts
Are humanoid robots all hype?Are humanoid robots all hype?
Podcast
Podcasts

AI is making them better — but they’re not going to be doing your chores anytime soon.

By Avishay Artsy and Sean Rameswaram
Future Perfect
The old tech that could help stop the next airborne pandemicThe old tech that could help stop the next airborne pandemic
Future Perfect

Glycol vapors, explained.

By Shayna Korol
Future Perfect
Elon Musk could lose his case against OpenAI — and still get what he wantsElon Musk could lose his case against OpenAI — and still get what he wants
Future Perfect

It’s not about who wins. It’s about the dirty laundry you air along the way.

By Sara Herschander
Life
Why banning kids from AI isn’t the answerWhy banning kids from AI isn’t the answer
Life

What kids really need in the age of artificial intelligence.

By Anna North
Culture
Anthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque messAnthropic owes authors $1.5B for pirating work — but the claims process is a Kafkaesque mess
Culture

“Your AI monster ate all our work. Now you’re trying to pay us off with this piece of garbage that doesn’t work.”

By Constance Grady
Future Perfect
Some deaf children are hearing again because of a new gene therapySome deaf children are hearing again because of a new gene therapy
Future Perfect

A medical field that almost died is quietly fixing one disease at a time.

By Bryan Walsh