, 26 tweets, 6 min read Read on Twitter
Thread:

My response to recent stories talking about how we should just let China spy on us.

Column here: theepochtimes.com/actually-we-pr…
Bloomberg News came out of left field on April 20, with the headline “We Should Let China Spy on Us.” bloomberg.com/amp/opinion/ar…
The main points are fair: Close to 80 percent of the CIA’s intelligence allegedly comes from open source information, and information from spies in the past has prevented the United States from jumping into full-scale war, such as during the Cold War.
The article misses some major points. It doesn’t seem to grasp the activities of Chinese spy operations through things like the United Front and the CSSAs and instead tries to relate these to intelligence gathering—which is a minor focus for these groups. uscc.gov/sites/default/…
The claim also doesn’t grasp the operations of Chinese hackers involved in the surveillance and intelligence operations, which it mentions, and how these interface with Chinese spies who operate on the ground.
The article assumes Chinese spies operate like U.S. spies, and focus mainly on intelligence gathering—to understand how a target operates and how it would react to key issues. Open source intelligence is very useful for information like this.
But operations like that are not what spies from the United Front Department are focused on.

Here's a small picture of what their operations look like: theepochtimes.com/chinese-subver…
The focus of the United Front is ideological subversion, establishing front organizations, controlling communities of overseas Chinese people, running smuggling and criminal networks, compromising individuals, and creating alleged grassroots support for the CCP.
Here's a more complete overview of what Chinese spies engage in, through the stages of ideological subversion: theepochtimes.com/assets/uploads…
Even during the Cold War, most Soviet spies weren’t focused on the James Bond-style spy operations.
Their focus was on establishing nonprofits to spread disinformation, organizing activist movements to support Soviet causes, sending “experts” to give commentary to news outlets, and compromising key people in the institutions that make the United States function.
Many spies, like those in the United Front Department, are looking to create a united “frontline” for the CCP in a targeted country—not to mention the use of sleeper agents who may be used to carry out acts of chaos or violence in the event of a war.
This is fundamentally different from gentle operations like intelligence gathering done through more conventional spy operations—the type of operations that the "let them spy on us" narrative uses.
The same applies to the CCP’s spy operations aimed at intellectual property theft. It’s true that most of the information is likely stolen by hacker agencies. But physical spies, operating on the ground, still play a fundamental—and very damaging—role. theepochtimes.com/how-communist-…
The Chinese hacker group that’s most commonly known is Unit 61398, which was under the Third Department of the war fighting department of the Chinese military, the General Staff Department. theepochtimes.com/investigative-…
The CCP has since restructured its military, but when Unit 61398 was exposed, it was just one of 22 known operational bureaus. This was before the CCP reorganized these operations under its Strategic Support Force.
The Third Department was the signals (SIGINT) intelligence branch, while next to it was the Second Department focused on human intelligence (HUMINT) operations, and the Fourth Department focused on electronics intelligence (ELINT) operations.
Other military branches were focused on other forms of unconventional operations that could include the use of spies, such as the General Political Department which was engaged in political warfare. project2049.net/2013/10/14/the…
Yet, even the CCP’s military hackers worked closely with spies on the ground. According to a 2013 report from a PLA research institute, outlined by the Center for Intelligence Research and Analysis, the CCP’s military hackers operated in three tiers. theepochtimes.com/china-security…
The first tier, it said, was military units “employed for carrying out network attack and defense,” the second tier was civilian organizations and government offices “authorized by the military to carry out network warfare operations.”
It said the third tier included groups outside the government and military “that can be organized and mobilized for network warfare operations.”
Also included in the operation were front companies. A 2010 report from the U.S. Defense Threat Reduction Agency said that the CCP operated more than 3,200 military front companies in the United States dedicated to theft.
Chinese espionage also takes the form of influence operations like the Committee of 100, focused on compromising American high society. theepochtimes.com/committee-of-1…
Chinese espionage takes the form of paid disinformation in U.S. newspapers. theepochtimes.com/its-time-to-ad…
The real problem with Chinese espionage is that most of it does happen legally. It stays within U.S. law, with the slogan to "strangle them with their own systems."

The problem is that we're already letting them spy on us—and the United States needs to put an end to it.
/End/ of thread for now.

But in parting, let's also not forget about this: theepochtimes.com/china-has-a-da…
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Joshua Philipp
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!