Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Chinese fixated on winning war against US via "assassin's mace."
U.S.-China Commission ^ | 7/15/2002 | Richard D'Amato

Posted on 07/15/2002 3:24:20 PM PDT by sam_paine

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 121-140 next last
To: Map Kernow
Excellent point. I . . . and my family make it a point to loudly shun anything "Made in China". For some items, it is vitrually impossible, even if you are willing to pay more.
21 posted on 07/15/2002 5:18:50 PM PDT by Vigilanteman
[ Post Reply | Private Reply | To 14 | View Replies]

To: spetznaz
Munro and Bernstein, The Coming Conflict with China, 1997, suggest China has four strategic objectives:

1) U.S. out of Asia;
2) Japan neutralized;
3) SoKo absorbed;
4) Taiwan absorbed.

Unrestricted Warfare, by Qiao Liang and Wang Xiangsui (Beijing: PLA Literature and Arts Publishing House, February 1999) suggests asymmetric means to accomplish these ends.

As noted, China uses sock puppet North Korea, and its proliferation clients as deniable agents, trained Al Qaeda/Taliban, works with Mexico, Venezuela, Panama and others to thwart our aims--even as Henry the K said we ought not thwart theirs.

China is the biggest customer of Russia's Arms 'R' Us, buying a third and fourth Sovremenny destroyer with Moskits, eight Kilos, Su-30's, while loading up on IRBMs (350 headed for 600) opposite Taiwan.

Meanwhile economic unrest and instability from unemployment riots to major bank insolvency loom. Jiang has cooked the books, exaggerating growth while understating weapons expenditures.

China will exploit our preoccupation with Iraq or some future terrorist attack to bully Taiwan.

They rely heavily on a perceived softness, viz Xiong Guangkai offering to charbroil L.A.--then being Clinton's guest in the White House January 24-26, 2000, to "reestablish military-to-military connections".

Surely they parleyed their arms status to a quantum-leap generational improvement by the Loral-Hughes 1995 200-page fax, and the work of burros like Wen Ho Lee (pobrecito "victim" of "profiling").

We are the great hegemon, and the EP-3C incident should have cleared away any doubt.

Cuba's Russian sigint base at Lourdes was closed this year, and China takes its place, recently spoofing New York air traffic control into thinking it was U.S. military.

Jiang is being glorified and may seek a dramatic gain to cement his defying statute and remaining in power.

Certainly we live in interesting times.

22 posted on 07/15/2002 5:30:35 PM PDT by PhilDragoo
[ Post Reply | Private Reply | To 15 | View Replies]

To: *China stuff; *china_stuff; *Clash of Civilizatio
.
23 posted on 07/15/2002 5:31:29 PM PDT by Libertarianize the GOP
[ Post Reply | Private Reply | To 1 | View Replies]

To: vannrox; sam_paine
{sam_paine} In reference to the article and report: About Freakin' time!!!!!!!!!!!!!!!!!

........I believe that their individual interests are not that different from ours.

{vannrox} You're kidding, right?

If not, then.............Between these little grinning, thuggish, greedy, cheating, totalitarian, sociopathic liars and those within this country that somehow in their own twisted, ignorant, flatulent, misguided way that can't see the difference between the two systems of government, here's hoping this country wakes up before its too late.

24 posted on 07/15/2002 5:36:48 PM PDT by DoctorMichael
[ Post Reply | Private Reply | To 5 | View Replies]

To: rightwing2; Hopalong; soccer8; Askel5; AM2000; Aaron_A; atc
Bump to you folks!
25 posted on 07/15/2002 6:08:34 PM PDT by Sawdring
[ Post Reply | Private Reply | To 1 | View Replies]

To: thatsnotnice
That's the truth. From where I sit in Japan, everything that China has done in the last 20 years seems geared to pushing the U.S. completely out of the Pacific and extending their influence throughout South-East Asia.

China's vision of its proper sphere of influence is everything from the Indian Ocean to Hawaii -- specifically including Australia and New Zealand.

China's long-term game plan for Malaysia, Indonesia, Thailand and the other nations of the region is based on gathering economic dominance. Nations that historically distrust China (Viet Nam, Japan, Taiwan etc.,) are also being wooed, but at the same time, serious work is being done to isolate and counter them militarily.

26 posted on 07/15/2002 6:15:01 PM PDT by Ronin
[ Post Reply | Private Reply | To 12 | View Replies]

To: Ronin
Many thanks again to Clinton for giving them our sensitive missile technology.........after all, we're "strategic partners", remember?
27 posted on 07/15/2002 6:29:30 PM PDT by Republic If You Can Keep It
[ Post Reply | Private Reply | To 26 | View Replies]

To: Sawdring
Thanks Sawdring. Much appreciated.

I like the "executive branch" dig but if you listen to them talking in The Message They're Sending is the Same Thing or listen to Byrd discuss the Virus that Infects the Senate, it's a little much to be arguing that our policy is somehow "fragmented".

That's about as ludicrous as pointing to some "partisanship" where abortion's concerned when -- in actuality -- abortion is a GOP policy for which the Democrats are charged with securing the Will (and Express Consent) of the People.

I still think China's gonna clean our clock. The cool thing being that it'll put the fear of God back in the Russians -- a revolution from below all the way to the top -- and she'll swing to the West for the Last Battle.

28 posted on 07/15/2002 6:34:16 PM PDT by Askel5
[ Post Reply | Private Reply | To 25 | View Replies]

To: Ronin
China's long-term game plan for Malaysia, Indonesia, Thailand .....

So won't there be several countries (numerically at least) which will want us to prop them up against China? Is that why we are seeing "cooperation" in Phillipines/Indonesia???

Seems like it'll be to the little guys' advantage to play the US against China to keep their little governments afloat....

29 posted on 07/15/2002 6:43:05 PM PDT by sam_paine
[ Post Reply | Private Reply | To 26 | View Replies]

To: Askel5
I think the US would crush China in a head to head conflict. But if they can keep the US navy at bay they might be able to make Taiwan stand down.
30 posted on 07/15/2002 6:43:17 PM PDT by Sawdring
[ Post Reply | Private Reply | To 28 | View Replies]

To: sam_paine
http://www.freerepublic.com/focus/news/710245/posts

Revelations that the Taliban was working on a telecom surveillance equipment with the help of the Chinese after 9-11

Cyber warfare could possibly qualify as "assassin's mace." Arming a surrogate to attack while China maintains deniability seems consistent with the committee's findings.

31 posted on 07/15/2002 6:44:42 PM PDT by honway
[ Post Reply | Private Reply | To 1 | View Replies]

To: sam_paine
But they're our friends. Nothing to see here, just move along..
32 posted on 07/15/2002 6:46:52 PM PDT by FormerLurker
[ Post Reply | Private Reply | To 1 | View Replies]

To: sam_paine
China's plan seems to be to buy them out rather slowly. At least as far as I can see. Let's face it, the ethnic Chinese control most of the economic clout in all these nations anyhow.

33 posted on 07/15/2002 6:49:40 PM PDT by Ronin
[ Post Reply | Private Reply | To 29 | View Replies]

To: honway
Friday, September 29, 2000

Chinese view mission-critical computer code

Report: FAA's air traffic control systems open to 'malicious attack'

by Charles Smith

According to a newly released General Accounting Office report on computer security, the Federal Aviation Administration has allowed Chinese nationals without security clearances to inspect "mission-critical" computer source code.

"We found instances in which background searches were not performed -- including on 36 mainland Chinese nationals who reviewed the computersource code of eight mission- critical systems as part of FAA's effort to ensure Year 2000 readiness," states the August GAO report.

"By again not following its own policies, FAA increased the exposure of its systems to intrusion and malicious attack," the report notes.

"FAA's own system penetration testing and vulnerability assessments demonstrate significant areas of weakness. Because of the sensitivity of this information, we do not publicly disclose details on these weaknesses."

The FAA security weakness, according to one defense adviser, could spell disaster in the near future. According to William Triplett, co-author of "Year of the Rat" and "Red Dragon Rising," the possible Chinese army penetration of critical U.S. air traffic control systems is part of an ongoing information war being waged against America.

"This has enormous implications for communist Chinese cyber warfare against the United States," stated Triplett, who has studied Chinese army information warfare. "In the event of a conflict, they could hold hostage the very lives of hundreds of thousands of American men, women and children."

According to Triplett's 1999 book "Red Dragon Rising," Chinese army information warfare is an "unheralded national security threat to the United States."

"The American economic, political and social system is essentially unprotected against a Chinese information warfare attack. As the PLA notes, 'America's economic system is extremely vulnerable to information attacks.' Senior PLA officers have begun to talk among themselves about a pre-emptive strike using information warfare," noted Triplett.

Concern over the GAO report is also growing on Capitol Hill. There are reports that the House National Security Committee discussed the GAO report in closed session on Wednesday. According to one congressional staffer,the FAA air traffic control system has previously been penetrated by theChinese military.

"The Chinese signals intelligence base in Cuba has already messed with FAA air traffic control around New York during a test last year," stated the source. "This whole situation is very troubling. The key is that these Chinese nationals were given access to 'mission-critical' parts of the FAA system. They know exactly where and how to bring it all down. If the Chinese army does take control of the U.S. air traffic control system, then planes will fall from the sky."

There is open evidence that American air traffic control is vulnerable to a Chinese cyber attack. The GAO has repeatedly documented security problems inside the FAA.

The August 2000 GAO report states that the FAA has "a history of computer security weaknesses in a number of areas, including its physical management at facilities that house air traffic control (ATC) systems, security for both operational and future systems, management structure for implementing security policies, and personnel systems.

"While FAA reports that it has performed background checks on the majority of its federal employees, the same cannot be said for its many thousands of contract employees," states the report.

"In January 2000, FAA estimated that it had over 28,000 existing contracts and purchase orders under which approximately 38,000 contract employees were engaged. However, according to the agency's database on contract personnel, background searches have been performed for only 16,000 contract employees since 1996, which -- even with the unlikely assumption that all of these people are still employed -- is less than half of the current contract employee population."

"Over the past three years, we have made over 20 recommendations to FAA to address these weaknesses in the areas of physical security of facilities, systems security, security management, and personnel security," noted the GAO report.

"While the agency is making progress in each of these areas, much work remains to be done to assess risks and to adequately protect critical ATC facilities, information and resources. Until this work is completed, FAA will remain noncompliant with its own security policies and the systems on which the flying public depends will continue to have vulnerabilities that are not being expeditiously identified and corrected."

In 1999, the General Accounting Office tested the physical security of the Federal Aviation Administration. GAO inspectors were able to penetrate secure areas including the offices of the secretary of State and critical air traffic computer rooms inside FAA facilities. The GAO auditors warned of the growing security problems during congressional testimony.

"We found significant weaknesses that compromise the integrity of FAA's air traffic control operations," stated the GAO auditor. "This review resulted in a number of findings too sensitive to discuss in today's open hearing; accordingly, my statement will refer only to findings and recommendations contained in the unclassified version of our limited official use report.We can tell you openly, though, that we found evidence of air traffic control systems that had been penetrated, and critical ATC data had been compromised."

"I am not familiar with this particular case at the FAA," stated Ross Munro, director of Asian Studies at the Center for Security Studies, a Washington based think tank.

"However, I am at least very concerned," noted Munro. "There are all too many instances where this administration has held exchanges with the People's Republic of China and the Americans are far more eager to ingratiate themselves with the Chinese than worry about U.S. national security interests."

Munro's concern that air traffic security has a lower priority than diplomatic overtures to China may be correct. Declassified documents from the FAA reveal that Chinese army officials were being given unprecedented access to both sensitive air control facilities and to American military bases at the same time FAA security had been compromised.

The Chinese military visits to U.S. air traffic control facilities took place under a civil airline modernization program for China. The documents, forced from the FAA by the Freedom of Information Act, are official Air Force, Commerce Department and FAA reports on Chinese military contacts between 1993 and 1999.

The documented meetings show that the Clinton administration attempted to conceal the military background of the Chinese representatives. For example, in 1993, a Chinese military delegation visited America under the FAA civil exchange program. According to the FAA, which sponsored the visit, the entire delegation was civilian. One FAA official, however, noted that many members of the Chinese delegation actually held rank in the People's Liberation Army.

In fact, the FAA official who attended the meeting wrote "military" next to the names of seven members of the 1993 "China Air Traffic Control" delegation in an apparent effort to track the Chinese army officers.

The 1993 FAA delegation list includes a "Mr. Kui Fulin," who toured FAA headquarters in Washington, D.C., Andrews AFB in Maryland and Boeing Aircraft Corporation in Washington state. According to the unknown FAA official, Kui was actually "Gen." Kui Fulin, Chinese army deputy chief of the General Staff. Kui is also known as the man who planned the brutal 1989 army attack on unarmed student demonstrations in Tiananmen Square.

The 1993 FAA list also states that "Mr. Li Yongtai" was the commissionerof the Air Traffic Control Commission of China. According to the handwritten notes taken by the FAA, Li was actually "Lt. Gen." Li of the Chinese air force.

According to the FAA documents, the Chinese army access to the FAA continued through 1999 under the civilian air program. In May 1999, documents show that Chinese air force and navy officers toured Edwards Air Force Base for the FAA civil program. Edwards AFB is a test center for Air Force and NASA research aircraft, including the space shuttle.

According to a May 1999 U.S. Air Force report, the Chinese were given details on "special airspace" areas inside America that are used for military training, research and national security zones. The Chinese military officers were also briefed on the latest in advanced "mobile radars," command and control systems, global positioning system navigation and surveillance radars.

During the tour, Chinese military officers were also given training on U.S. Air Force combat missions, including "bombing and strafing" and "combat readiness." The U.S. Air Force documents show Chinese air force officers were given a "simulated" F-16 training mission under the FAA civil program.

The training included a "two ship formation of F-16s from Luke AFB,Ariz.," on a "bombing" and over-flight mission in a training area, code-named "Baghdad," northwest of Prescott, Ariz. The simulated exercise also included "in-flight refueling" with a tanker aircraft under control of a U.S. Air Force airborne radar plane.

China's sigint installation on Cuba spoofed New York air traffic control this year into thinking it was U.S. military.

34 posted on 07/15/2002 6:53:28 PM PDT by PhilDragoo
[ Post Reply | Private Reply | To 31 | View Replies]

To: headsonpikes
Have you taken a look at the idiots manning the airport "security"?
35 posted on 07/15/2002 7:16:00 PM PDT by Blood of Tyrants
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ronin
Buy them out, as in the tinpot despots, but not the people....I hope!! Surely everyone knows what they are doing to Hong Kong...unemployment...moving operations to China's coast....draining the miracle.

Exactly what they will do to Taiwan and any other Island down there.

36 posted on 07/15/2002 7:16:31 PM PDT by sam_paine
[ Post Reply | Private Reply | To 33 | View Replies]

To: sheik yerbouty; Map Kernow
The primary purpose of having a defense is deterrence. If deterrence fails, regardless of whether we ultimately prevail, we will have lost. We will have lost millions of American lives (including you, or someone you care about). We will have lost our security. We will have sacrificed rights that will make the traditional concept of "freedom" forever different.

The issue is not whether the U.S. can "win" a war against China, or more specifically, a Chinese led Axis, but whether we can convincingly deter such a war. The evidence is not good. The Chinese believe they can succeed in a war against the U.S., and that they could sustain the casualties such a war would entail.

If L.A. or N.Y. disappears tomorrow in a nuclear holocaust from a terrorist nuke, or a biological epidemic sweeps through the West, it will be months or years before the U.S. identifies the culprit. The Chinese, meanwhile, will move decisively to capitalize on the resulting vacuum in U.S. power, while we try to grapple with disaster, a collapsing economy, political unrest, and a dozen military situations around the world.

The threat has never been more real. I hope Bush's crew has a better handle on this behind the scenes, than is evident in public.

37 posted on 07/15/2002 7:32:03 PM PDT by Steel and Fire and Stone
[ Post Reply | Private Reply | To 6 | View Replies]

To: Sawdring
All the scandals and indiscretions of the past are water under the bridge, we need to start looking at ways to neuter the Chinese dragon before it gets outta control.
38 posted on 07/15/2002 7:50:13 PM PDT by Aaron_A
[ Post Reply | Private Reply | To 25 | View Replies]

To: headsonpikes
I guess I just keep assuming that when push comes to shove, we'll unleash Hell on them.

I know, I know... someone has a plan, I guess...

I understand the sentiment though...

39 posted on 07/15/2002 7:54:26 PM PDT by thatsnotnice
[ Post Reply | Private Reply | To 16 | View Replies]

To: sam_paine
The monkey distracts one's attention away from the organ grinder, the true brains of the operation.

This world war has started.
40 posted on 07/15/2002 8:32:58 PM PDT by SevenDaysInMay
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 121-140 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson