Recent talks with Chinese delegation achieve little progress
China’s aggressive cyber espionage and military reconnaissance operations against both U.S. government and private networks show no sign of abating under the Obama administration’s policy of holding talks and threatening but not taking punitive action.
Typical of the administration’s approach has been the seemingly endless series of high-level meetings with Chinese officials, such as talks held last week in Washington to discuss “norms” of behavior in cyberspace.
For at least the past five years, President Obama and the White House have ignored appeals from security and military officials, as well as from Congress and the private sector, to show greater resolve and take some type of action against the Chinese, lest the country’s technology wealth be drained empty. Continue reading
U.S. Steel Corp accused the Chinese government of hacking into a company computer to steal the blueprints for new lightweight steel technology so that Beijing-based auto producers could expand their reach into America.
The Wall Street Journal reported Thursday that U.S. Steel filed a complaint with the International Trade Commission earlier this week accusing the Xi government of working on the behalf of Chinese auto companies to swipe proprietary plans for the new steel. Continue reading
For the first time since 1985, when the Federal Bureau of Investigation broke the John Walker spy ring, an active United States Navy officer has been charged with espionage. On Sunday, the US Navy reported the arrest Lt. Cmdr. Edward C. Lin, who faces two counts of espionage and three counts of attempted espionage, among other charges. Aside from a three-page, heavily redacted charge sheet released by the US Navy, almost nothing is known about this case. However, there are several clues that point to the seriousness of the charges against Lin, and their potential ramifications for US national security, which are likely to be extensive. Continue reading
The intent of this essay is to advance several observations about how we plan and fight wars, in order to shed light upon why we are performing so poorly. We invaded both Afghanistan and Iraq with inchoate plans and inadequate forces to establish post-war security and governance. After winning the first battle in both countries, President George W. Bush offhandedly decided to build democratic nations, a task for which our State Department and US Agency for International Development had no competence or interest. By default, the mission fell to our military, also without competence but with unflagging devotion and determination.
When 2011 arrived, President Barack Obama went against the recommendations of the intelligence community, the Pentagon, and the State Department. Instead of politically maneuvering to keep a residual force to check al-Maliki’s dark instincts, Obama pulled out all our troops. He fulfilled Bush’s foolish promise. Al-Maliki then proceeded to oppress the Sunnis, leading to the reemergence of the extremists now called the Islamic State. Obama quit, but Bush made it easy for him to do so.
A Chinese man has pleaded guilty in a “years-long” conspiracy to hack into U.S. networks to steal sensitive information, including data on the C-17 cargo plane and fighter jet aircraft, the Justice Department announced Wednesday.
Su Bin, also known as Stephen Su and Stephen Subin, 50, a citizen and resident of the People’s Republic of China, pleaded guilty to the crime in the United States District Court for the Central District of California, according to a press release from the department. Continue reading
Two Chinese soldiers were “co-conspirators” in a plot to steal US military secrets, including designs for the F-35 stealth fighter and other warplanes, a Canadian newspaper reported Tuesday.
The unnamed pair allegedly worked with a recent immigrant to Canada now facing extradition to the United States to identify and raid secure databases of US military contractors, said the Globe and Mail newspaper, citing a prosecution summary of a cyberespionage probe launched in 2014. Continue reading
The U.S. Department of Justice has charged six Chinese nationals with economic espionage and theft of trade secrets for allegedly accessing secret U.S. technologies and sharing them with universities and companies controlled by the Chinese government.
Unsealing an indictment filed last month, U.S. officials in Washington announced the charges Tuesday. The defendants, all Chinese nationals, include Hao Zhang, who is in custody, his fellow engineer Wei Pang and four other Chinese engineers and professors of stealing trade secrets from two U.S. technology companies, Skyworks Solutions and Avago Technologies. Continue reading
Just like the Russians today, China has its own separate plans. Yet, it is with One Clenched Fist by a Sino-Soviet alliance that will strike America after it is lulled into a false sense of security by consuming endless New Lies for Old after many decades. The tragedy in all of this is when America finally wakes up, it’s too late. However, from time to time you do find pockets of information such as this by a writer who may ‘get it’.
For more information on shashou jian, or “Assassin’s Mace”, here are some aged yet very relevant articles covering the threat from China:
In 1995, Michael Pillsbury, an expert on China who has worked with every US president since Nixon and has, he writes, “arguably had more access to China’s military and intelligence establishment than any other Westerner,” was reading an article written by “three of China’s preeminent military experts” about “new technologies that would contribute to the defeat of the United States.”
It was in this article that Pillsbury first saw the term “Assassin’s Mace,” which refers to a weapon from Chinese folklore that guarantees a small combatant victory over a larger, more powerful opponent.
The article described goals including “electromagnetic combat superiority” that would allow for “naval victory,” and “tactical laser weapons” that would “be used first in anti-missile defense systems.” They also discussed jamming and destroying radar and various communications systems, and the use of computer viruses. Continue reading
German magazine Der Spiegel has published new disclosures of signals intelligence collected by the United States National Security Agency (NSA) and its “Five Eyes” partners, including the Australian Signals Directorate. The intelligence reveals new details of the directorate’s efforts to track and combat Chinese cyber-espionage.
According to a top secret NSA presentation, Chinese cyber spies have stolen huge volumes of sensitive military information, including “many terabytes of data” relating to the Joint Strike Fighter (JSF) – also known as the Lockheed Martin F-35 Lightning II. Continue reading
This is a new development in what was previously posted, showing the level of access and its official state support.
A federal weather service employee charged with stealing sensitive infrastructure data from an Army Corps of Engineers database met a Chinese government official in Beijing, according to court documents that reveal the case to be part of an FBI probe of Chinese economic espionage.
Xiafen “Sherry” Chen, an employee of the National Oceanic and Atmospheric Administration (NOAA) office in Ohio, was arrested in October and charged in a federal grand jury indictment with illegally accessing the Army’s National Inventory of Dams (NID).
The NID is a sensitive database containing information on all U.S. dams. U.S. intelligence officials have said the database was compromised by Chinese hackers in 2013 as part of covert efforts by Beijing to gather sensitive information on critical U.S. infrastructure for possible use in a future conflict. Continue reading
THE US has charged five members of a shadowy Chinese military unit for allegedly hacking US companies for trade secrets, infuriating Beijing which suspended cooperation on cyber issues.
Hacking has long been a major sticking point in relations between the world’s two largest economies, but Washington’s move marks a major escalation in the dispute.
In the first-ever prosecution of state actors over cyber-espionage, a federal grand jury overnight indicted the five on charges they broke into US computers to benefit Chinese state-owned companies, leading to job losses in the United States in steel, solar and other industries. Continue reading
Pentagon, State Department silent on threatening reports outlining Chinese plans for nuclear attacks on U.S. cities
State Department spokeswoman Marie Harf and Pentagon spokeswoman Cynthia Smith would not respond when asked about the highly unusual Chinese reports published Oct. 28 in numerous major Communist Party-controlled television and newspaper outlets.
The Chinese reports included maps showing nuclear strikes on Los Angeles and the Pacific Northwest, along with the resulting radiation plumes stretching thousands of miles across the western United States. Continue reading
The United States faces a massive US$8 trillion infrastructure investment bill, and is courting Chinese investors since many of its own local governments are in financial difficulties, according to a US Chamber of Commerce report.
“The US is poised to undertake the most significant expansion and modernisation of its infrastructure since the 1950s,” the chamber said in its report.
“This is taking place in the context of significant pressure on federal and local budgets. The pressing need for capital to modernise US infrastructure is creating substantial new opportunities for Chinese investors.” Continue reading
U.S. spy’s secrets assist Chinese electronic warfare against U.S. military data links
China’s military is using stolen U.S. military secrets obtained from a convicted spy to defeat a high-technology communications system used in joint warfighting, combined arms warfare, and missile defenses, according to U.S. officials.
The disclosure that China has the capability of jamming the Joint Tactical Information Distribution System, or JTIDS, was revealed in a Chinese military technical article published in July. Continue reading
The Clintons helped the Chinese modernize and eventually become on par with American military might, whereas the Obamas will aid them in surpassing American military might. The USA is in grave danger but sadly most Americans are too busy worrying about how their favorite NFL team will perform next Sunday afternoon.
Rep. Frank Wolf (R., Va.) seems to have finally awakened from his sleep to the threat within this case, but is still only “surprised” — yet doesn’t know this has been going on for decades.
Additional sources on the Clinton-China connection:
China asks Obama administration to loosen controls on exports of high-tech military goods and lift all sanctions
China has supplied the Obama administration with a detailed list of space, military, and defense technology controls that it wants changed, and an interagency review is underway to meet some of Beijing’s demands, according to U.S. officials.
The Chinese government list of U.S. defense and dual-use civilian-military trade controls and policy changes was sent recently to the Commerce Department in preparation for an upcoming meeting of the U.S.-China Joint Commission on Commerce and Trade (JCCT).
The request includes lifting all sanctions imposed by Congress after the 1989 Tiananmen Square massacre; permitting transfers of 15 Black Hawk engines for helicopters sold in the 1980s prior to those sanctions; and the lifting of U.S. sanctions on five Chinese companies involved in past illicit arms sales to Iran, and other rogue states, according to officials familiar with internal reports. Continue reading