Chinese Hackers? US Propagandists Should Look in the Mirror
By Eric Draitser |New Eastern Outlook | November 4, 2015
Like millions of Americans, this past week I was sitting on my couch, drinking a cold beer, watching Game 1 of the World Series – professional baseball’s hallowed championship. Suddenly the satellite feed went out, the screen went dark. Naturally, as FOX Sports scrambled to get their live feed fixed, many of my fellow Americans took to twitter to speculate as to what had caused the outage. I was, sadly, unsurprised to see that the most common joke people were making was that China must have hacked the World Series.
On the one hand, it is understandable given the barrage of propaganda about Chinese hackers as a threat to corporate and national security; seemingly every week there is a new news item highlighting the great red cyber-menace. On the other hand, it is a perfect illustration of the hypocrisy and ignorant arrogance of Americans who, despite being citizens of unquestionably the most aggressive nation when it comes to both cyber espionage and surveillance, see fit to cast China as the real villain. It is a testament to the power of both propaganda and imperial triumphalism that a proposition so disconnected from reality, and bordering on Orwellian Doublethink, is not only accepted, but is ipso facto true.
But there is a deeper political and sociological phenomenon at play here, one that begs further exploration. How is it that despite all the revelations of Edward Snowden regarding US intelligence and military snooping capabilities across the globe, Americans still cannot accept the culpability of their own government and corporate interests – the two work hand in hand – in global cyber-espionage? Even if they explicitly or implicitly know about the NSA, CIA, DIA, and Pentagon programs (among many others), their instinctive reaction is to blame China. Why? The answer lies in the complexity and effectiveness of the anti-China propaganda.
In his landmark book Public Opinion, the renowned writer, commentator, and theoretician of propaganda, Walter Lipmann, defined the term “stereotype” in the modern psychological sense as a “distorted picture or image in a person’s mind, not based on personal experience, but derived culturally.” In other words, the stereotype is an image in our mind’s eye, one that is constructed by outside forces; it is information filtered through a particular societal or cultural framework that then creates a picture of how something is to be understood. Lipmann went further, noting that carefully constructed propaganda could be used to shape stereotypes, thereby allowing the powers that be the ability to construct and manipulate information and narratives.
And this is precisely the phenomenon at work here. By repeating it endlessly, the US political and corporate media establishment have successfully convinced Americans that China is the real threat when it comes to cyberspace, playing on the stereotype of Chinese people in general, and the People’s Republic of China specifically. But, I would argue something far different: rather than seeing China as a threat, perhaps Americans, and westerners generally, should shine a light on what their own countries are doing, thereby gaining a broader perspective on the issue. For China’s moves in this field pale in comparison to those of the US, and are clearly a response to them.
China and the US: Comparing the Rap Sheets
The corporate media is replete with stories of Chinese hacking of US institutions. From alleged Chinese hacking of the University of Virginia employees connected with US government programs directed at China, to the infamous breach of the federal government’s Office of Personnel Management which resulted in the theft of the personal information of more than 20 million Americans, such stories help to construct an image of China as the world’s leading hacker-state. This week it is Chinese hackers targeting health care providers, last year it was stealing the secrets of Westinghouse and US Steel, and literally dozens of other such examples.
The purpose of this article is not to deny the veracity of these reports; I’m not a computer expert, nor do I have access to the information that an expert would need in making a determination. Instead, my purpose here is to show the grossly unbalanced, and utterly dishonest, way in which the issue is presented to Americans especially, and to probe why that might be. For any fair and balanced approach to the issue would present the simple fact that the US is the world leader in cyber-warfare, having actually conducted what are to date the only recorded live uses of cyberweapons.
Take for instance the joint US-Israel developed Stuxnet virus, a pair of highly complex and severely destructive, computer viruses launched at Iran’s nuclear facilities. According to a group of independent legal experts assembled at the request of NATO’s Cooperative Cyber Defense Center of Excellence, the Stuxnet cyberattack was “an act of force.” Their report noted that “Acts that kill or injure persons or destroy or damage objects are unambiguously uses of force [and likely violate international law].”
Indeed, the US and its Israeli partners launched the very first true cyberweapon. As cyber security expert Ralph Langer wrote in Foreign Policy in 2013:
Stuxnet is not really one weapon, but two. The vast majority of the attention has been paid to Stuxnet’s smaller and simpler attack routine — the one that changes the speeds of the rotors in a centrifuge, which is used to enrich uranium. But the second and “forgotten” routine is about an order of magnitude more complex and stealthy. It qualifies as a nightmare for those who understand industrial control system security… The “original” payload… attempted to overpressurize Natanz’s centrifuges by sabotaging the system meant to keep the cascades of centrifuges safe.
Essentially, the US and Israel employed the world’s first cyberweapon without even fully knowing the potentially destructive consequences. As the virus migrated out of the Iranian nuclear facility at Natanz and onto the internet, innumerable variables could have come into play, with the potential for disastrous outcomes.
But of course Stuxnet was not alone. The US and Israel also deployed both the Gauss and Flame viruses, two more sophisticated cyberweapons designed to cause major damage to online infrastructure. The Gauss virus, discovered by Kaspersky labs, one of the world’s most highly respected cyber-security firms, was designed to steal sensitive data such as financial records. According to the US officials who spoke with the Washington Post, the Flame virus was a: massive piece of malware [which] secretly mapped and monitored Iran’s computer networks, sending back a steady stream of intelligence to prepare for a cyberwarfare campaign… “This is about preparing the battlefield for another type of covert action… Cyber-collection against the Iranian program is way further down the road than this.” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today.
Clearly the US and Israel were not merely interested in surveillance and information-gathering, but actually having the ability to manipulate and destroy vital computer infrastructure in Iran. Any reasonable reading of international law should hold that such actions are, in fact, an act of war, though of course war with Iran has not come to pass. But just the very use of such sophisticated weapons, far more elaborate, technical, and dangerous than mere hacking by humans, should call into question the weepy-eyed condemnations of China for its alleged stealing of corporate and government information.
And then of course there is the seemingly endless supply of revelations from Edward Snowden regarding the US surveillance infrastructure, how all-encompassing it truly is, how it is used to manipulate political outcomes, how it is used as a weapon against foreign governments, and much more.
Just to name a few of the countless programs and initiatives of the NSA and the surveillance state designed to capture information for political purposes:
PRISM – allows “The National Security Agency and the FBI [to tap] directly into the central servers of nine leading U.S. internet companies, extracting audio and video chats, photographs, emails, documents, and connection logs.”
BLARNEY – “Gathers up metadata from choke points along the backbone of the internet as part of an ongoing collection program the leverages IC (intelligence community) and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”
Boundless Informant – “Details and even maps by country the voluminous amount of information it collects from computer and telephone networks.”
US & UK Target G20 Leaders – “The documents suggest that the operation was sanctioned in principle at a senior level in the government.”
US Spied on EU Offices – “America’s National Security Agency (NSA) not only conducted online surveillance of European citizens, but also appears to have specifically targeted buildings housing European Union institutions… in addition to installing bugs in the building in downtown Washington, DC, the European Union representation’s computer network was also infiltrated.”
But of course, the US has also specifically, and successfully, trained its cyber-espionage and cyber-warfare sights on China itself. Thanks to Snowden, we now know that US intelligence repeatedly hacked into Beijing’s Tsinghua University, China’s top education and research institute. As revealed in the South China Morning Post:
The information also showed that the attacks on Tsinghua University were intensive and concerted efforts. In one single day of January, at least 63 computers and servers in Tsinghua University have been hacked by the NSA… The university is home to one of the mainland’s six major backbone networks, the China Education and Research Network (CERNET) from where internet data from millions of Chinese citizens could be mined. The network was the country’s first internet backbone network and has evolved into the world’s largest national research hub.
But it wasn’t only Tsinghua University that was targeted. Snowden also revealed that Chinese University in Hong Kong was the victim of US hacking; the university is home to the Hong Kong Internet Exchange, the city’s central hub for all internet traffic. In addition, it came out that US intelligence has repeatedly hacked into Chinese mobile phone companies, spied on users, and stolen data, including text messages. These are, of course, only what we know about thus far from the Snowden revelations. The scope of US hacking operations against China is not known, but could be safely assumed to be far-reaching.
In fact, the depth of US hacking and other intelligence operations targeting China, including those taking place inside China itself, has been alluded to repeatedly. The New York Times noted in August 2015 that the Obama administration was cautious about any retaliation against China for the breach of the Office of Personnel Management because “Intelligence officials say that any legal case could result in exposing American intelligence operations inside China — including the placement of thousands of implants in Chinese computer networks to warn of impending attacks.”
It is clear that what we do know about US cyberwar programs and tactics is really only the tip of the iceberg. It is likely that Washington has myriad other China-specific hacking programs and initiatives, including the much discussed attempts to subvert the oft referenced “Great Firewall of China.” Put simply, the US is engaged in the most sophisticated forms of hacking and cyber-subversion, and much of it is directed at China (and Russia and Iran). This should now be beyond question.
Keep this information in mind the next time another story about Chinese hackers attacking US interests runs in the corporate media. While the hack may or may not be true, it is the context within which such actions take place that really needs to be understood.
There is a cyberwar going on, of this there can be no doubt. But who’s got the biggest guns? And who fired the first shot?
Share this:
Related
November 6, 2015 - Posted by aletho | Deception, Mainstream Media, Warmongering, Timeless or most popular | China, CIA, DIA, Gauss, Iran, Israel, NSA, Stuxnet, United States, Zionism
1 Comment »
Leave a comment Cancel reply
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Featured Video
REDFIELD REWRITES THE RECORD
or go to
Aletho News Archives – Video-Images
From the Archives
Iran Delenda Est
By Stephen J. Sniegoski • Unz Review • July 25, 2019
After Carthage had been significantly weakened by Rome in the Second Punic War (218 to 201 BC), Cato the Elder, a leading Roman senator, is said to have ended all his speeches with the words: “Carthago delenda est!” (“Carthage must be destroyed!”). This destruction ultimately took place in the Third Punic War (149–146 BC). A somewhat similar situation exists today in the United States, where war hawks demand that Iran–which in no way could effectively attack the United States, or even conquer America’s Middle East so-called allies—be stripped of its ability to protect itself.
Of course, what makes the American situation different from ancient Rome’s is that Rome sought to eliminate Carthage for its own interests whereas the United States is largely acting to advance the military interests of Israel… continue
Blog Roll
-
Join 2,406 other subscribers
Visits Since December 2009
- 7,308,315 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen ZionismRecent Comments
loongtip on Trump tells India to stop purc… eddieb on The Old Testament and the Geno… papasha408 on Trump’s war posturing against… Coronistan on This is How We Should Have Res… Coronistan on NO MANDATES, NO PROFITS: MODER… Lutz Barz on Russia Vows to Protect Its Oil… loongtip on Russia Vows to Protect Its Oil… loongtip on Hamas never agreed to lay down… eddieb on Conspiracy Denial eddieb on WEF Calls for ‘Cultural Revolu… loongtip on Trump wanted to play peacemake… Coronistan on EU member to sue bloc over ‘su…
Aletho News- REDFIELD REWRITES THE RECORD
- From Iraq war crimes to Gaza’s ‘board of peace’: Why Tony Blair belongs in The Hague
- Epstein email reveals plan to pursue frozen Libyan assets with help from former MI6, Mossad figures
- Trump tells India to stop purchasing Iran oil, buy Venezuelan instead
- How Trump’s Iran Gambit Could Blow Up the Entire Persian Gulf
- Rafah crossing reopens under strict Israeli restrictions
- The Attack on Pearl Harbor Was No Surprise (Part V)
- How Human Rights Watch Shattered Yugoslavia
- Hamas rejects Israeli accusations as “lies meant to justify its massacres in Gaza”
- Interior ministry: Israeli strike on police building in Gaza shows disregard for mediators
If Americans Knew- Israel killed at least 32 Gazans on Saturday – Not a ceasefire Day 114
- Is Israel opening the Rafah border to depopulate Gaza? – Not a ceasefire Day 113
- NBA Star Stephen Curry’s Ties To Israeli Military Intelligence
- ‘Apocalyptic wasteland’: Biden admin. blocked warning on deteriorating Gaza situation after Oct. 7
- Why Israeli counterterrorism tactics are showing up in Minnesota
- Israel Went to Extremes to Return Ran Gvili’s Body. Why Doesn’t It Accord Dead Palestinians the Same Respect?
- Across the West, speaking for Palestine is now a crime
- A West Bank Bus Trip Through ‘the Best Documented Ethnic Cleansing in History’
- Mike Huckabee’s distorted theology does not speak for Christians worldwide
- CBS Evening News” With Tony Dokoupil Is Ellisons’ & Weiss’s Pro-Israel Show
No Tricks Zone- One Reason Only For Germany’s Heating Gas Crisis: Its Hardcore-Dumbass Energy Policy
- 130 Years Later: The CO2 Greenhouse Effect Is Still Only An Imaginary-World Thought Experiment
- New Study Affirms Rising CO2’s Greening Impact Across India – A Region With No Net Warming In 75 Years
- Germany’s Natural Gas Crisis Escalates … One Storage Site Near Empty …Government Silent
- Polar Colding…Antarctica Saw Its Coldest October In 44 Years!
- New Study: Sea Levels Rose 20 Times The Modern Rate During The Roman Warm Period
- As German Gas Storage Dips Dangerously Low…Shortage Hardly Avoidable
- New Study: Brazil’s Relative Sea Level Was 2+ Meters Higher And SSTs 3-4°C Warmer 6000 Years Ago
- Philosopher Schopenhauer: Climate Science Certainty Stems From Stupidity, Ignorance
- New Study: Species Extinction Rates Declining Since 1980 – ‘Climate Change Is Not An Important Threat’
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

The Americans make great play about Chinese hackers stealing America’s secrets, but, as Edward Snowden has revealed, the USA will take advantage of ANY technological innovation they can get their hands on, from what ever source, using the NSA technology shared by “The Five Eyes”
LikeLike