China’s Cyberspying Is ‘on a Scale No One Imagined’–if You Pretend NSA Doesn’t Exist

4 August 2015 — FAIR

NSA headquartersStories about cyberespionage–like the data theft at the US Office of Personal Management believed but not officially stated to have been carried out by China–are weird. For one thing, they include quotes about how “we need to be a bit more public” about our responses to cyberattacks–delivered from White House officials who speak only on condition of anonymity.

That’s from a July 31 piece by the New York Times‘ David Sanger, which, as Marcy Wheeler of the blog Emptywheel (8/1/15) pointed out, had a certain amount of fiction mixed in with its reporting.

Sanger wrote that the administration concluded that the hacking attack was “so vast in scope and ambition that the usual practices for dealing with traditional espionage cases did not apply.” He called it “espionage, on a scale that no one imagined before.”

But how can that be? China is accused of obtaining personal information about 20 million Americans, federal employees and contractors, and that’s a big deal. But the US’s NSA, according to documents leaked by whistleblower Edward Snowden, processes 20 billionphone calls and internet messages every day. The NSA’s unofficial motto for years has been “Collect It All.”

The article notes that the US has its own “intelligence operations inside China”—but pretends these are purely defensive, referring to “the placement of thousands of implants in Chinese computer networks to warn of impending attacks.”

Sanger was one of the main journalists covering the joint US/Israeli cyberattack against Iran known as Stuxnet; one of his stories went out under the headline, “Obama Ordered Wave of Cyberattacks Against Iran.” But here, in this context, he writes, “The United States has been cautious about using cyberweapons or even discussing it.”

No, no, they discuss them plenty, and use them too–some media have just decided that the public should only sometimes hear about it.

Janine Jackson is the program director of FAIR and the host of CounterSpin.

You can send a message to the New York Times at, or to public editor Margaret Sullivan at (Twitter:@NYTimes or @Sulliview). Please remember that respectful communication is the most effective.

Read the original post here.

One thought on “China’s Cyberspying Is ‘on a Scale No One Imagined’–if You Pretend NSA Doesn’t Exist

  1. Tad Davison says:

    The sooner the world comes to know and understand that the USA is in fact a fascist state in all but name, the sooner the world will know peace and stability. They are the common denominator who are inextricably linked to almost every single conflict or act of suppression the world over, and have been for many decades.

    Here in the UK, our domestic politicians are of such poor quality, they automatically believe anything that comes out of Washington. And it is truly amazing to see how many have been funded by Zionists with their own agenda (see Peter Oborne’s excellent documentary to that effect, freely available to view on YouTube).

    Our mainstream media are just as culpable, being entrenched in their love for all-things USA, and glossing over or disregarding completely, the wealth of condemnatory evidence that shows just how skewed the world really is. Washington and their henchmen will use any means at their disposal to pour scorn upon another country if it suits their ultimate ambition of controlling the entire planet. China is but one victim of many.

    The UK should be tying it’s wagon to a different horse, and one with far better credentials where honesty and integrity actually stand for something, and nepotism and corporate greed are consigned to the dustbin of history.

    But only thinking people will ever take the trouble to search out the truth for themselves. The rest will continue in blissful ignorance until it is far too late, and America’s fascism engulfs us all.

    Tad Davison

    Cambridge UK


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.