National Geographic gets paid to promote Chinese culture

China’s State Council Information Office (SCIO) on Wednesday signed a memorandum of understanding (MOU) with the US National Geographic Society (NGS) and venture capital organization International Data Group (IDG) to promote Chinese culture and cultural exchanges between the two countries. Continue reading

China‘s secret plan to topple the US as the world’s superpower

Just like the Russians today, China has its own separate plans. Yet, it is with One Clenched Fist by a Sino-Soviet alliance that will strike America after it is lulled into a false sense of security by consuming endless New Lies for Old after many decades. The tragedy in all of this is when America finally wakes up, it’s too late. However, from time to time you do find pockets of information such as this by a writer who may ‘get it’.

For more information on shashou jian, or “Assassin’s Mace”, here are some aged yet very relevant articles covering the threat from China:

China’s ‘shashou jiang’ ignores Western ‘rules’ of geostrategy

Mass espionage by ‘lovable’ China and its 3,500 ‘front companies’

Does Western Espionage Exist?

China Seeks World Domination

 

In 1995, Michael Pillsbury, an expert on China who has worked with every US president since Nixon and has, he writes, “arguably had more access to China’s military and intelligence establishment than any other Westerner,” was reading an article written by “three of China’s preeminent military experts” about “new technologies that would contribute to the defeat of the United States.”

It was in this article that Pillsbury first saw the term “Assassin’s Mace,” which refers to a weapon from Chinese folklore that guarantees a small combatant victory over a larger, more powerful opponent.

The article described goals including “electromagnetic combat superiority” that would allow for “naval victory,” and “tactical laser weapons” that would “be used first in anti-missile defense systems.” They also discussed jamming and destroying radar and various communications systems, and the use of computer viruses. Continue reading