Franklin Foer writes: A foreign government has hacked a political party’s computers — and possibly an election. It has stolen documents and timed their release to explode with maximum damage. It is a strike against our civic infrastructure. And though nobody died — and there was no economic toll exacted — the Russians were aiming for a tender spot, a central node of our democracy.
It was hard to see the perniciousness of this attack at first, especially given how news media initially covered the story. The Russians, after all, didn’t knock out a power grid. And when the stolen information arrived, it was dressed in the ideology of WikiLeaks, which presents its exploits as possessing a kind of journalistic bravery the traditional media lacks.
But this document dump wasn’t a high-minded act of transparency. To state the obvious, only one political party has been exposed. (Selectively exposed: Many emails were culled from the abridged dump.) And it’s not really even the inner workings of the Democrats that have been revealed; the documents don’t suggest new layers of corruption or detail any new conspiracies. They’re something closer to the embarrassing emails that fly across every office in America — griping, the testing of stupid ideas, the banal musings that take place in private correspondence. The emails don’t get us much beyond a fact every sentient political observer could already see: Officials at the DNC, hired to work hand in glove with a seemingly inevitable nominee, were actively making life easier for Hillary Clinton. It didn’t take these leaks to understand that Debbie Wasserman Schultz is a hack and that the DNC should be far more neutral in presidential primaries.
What’s galling about the WikiLeaks dump is the way in which the organization has blurred the distinction between leaks and hacks. Leaks are an important tool of journalism and accountability. When an insider uncovers malfeasance, he brings information to the public in order to stop the wrongdoing. That’s not what happened here. The better analogy for these hacks is Watergate. [Continue reading…]