They spent a lot of money to get access to "trade-policy documents, meeting notes, trip reports and schedules." They probably could have gotten the same info by saying, "Please?" The Wall Street Journal is breathlessly reporting that earlier this year Chinese hackers broke into the U.S. Chamber of Commerce computers “and gained access to everything stored on its systems.” So? What exactly could examining the files of “America’s top business-lobbying group” get them? They now have detailed information on the group’s three million members, apparently. By detailed information I’m guessing this means email addresses, whether dues are paid and … what? It’s not like any of the members are entrusting the Chamber with trade secrets. Actually, what the hackers got was “the names of companies and key people in contact with the Chamber, as well as trade-policy documents, meeting notes, trip reports and schedules.” Not exactly info that’s going to alter the economic balance of power. If there’s any interesting information to be had there, it’s in the emails and files detailing the relationship between lobbyists and politicians. What’s most interesting about all this is what it possibly implies about China’s cyber spying efforts. This was not a small operation. It apparently involved at least 300 internet addresses and had a staff that was keeping regular business hours. From this, we could infer: China knows so little about how America works that it thought this was a good place to target. China is trying to improve its own lobbying efforts. China confused the Chamber with the Rotary and was really looking for how to run small lunch groups on a nation-wide scale. Worst case: China has already infiltrated all of our important networks and is now going after the unimportant ones, “just to be sure.” The Chinese of course denied the allegations. An embassy spokesman said it “lacks proof and evidence and is irresponsible,” and added that the hacking issue shouldn’t be “politicized.” I’m pretty sure he has these lines memorized by now and could repeat them in his sleep in case of an emergency. Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe