<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=GQZnj1aEsk00EH" style="display:none" height="1" width="1" alt="" /> China Spying - Technology Transfers History

Author Topic: China Spying - Technology Transfers History  (Read 44435 times)

1 Member and 1 Guest are viewing this topic.

Offline Geniocrat

  • Member
  • *****
  • Posts: 1,875
    • View Profile
    • Email
    • Personal Message (Offline)
Re: China Spying - Technology Transfers History
« Reply #40 on: January 12, 2014, 04:32:58 PM »
The US economy will collapse and China will supply the Globalists with all the technology they will need to establish martial law and bring about the North American Union.

Endgame

http://www.youtube.com/watch?v=x-CrNlilZho

This Chinese espionage is really funny considering we have been outsourcing our technology over there for some time now.

China figures it is just a matter of time till they own our asses anyway.

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #41 on: May 19, 2014, 12:50:36 PM »
This sounds political to me ... this has been and is continuing to go on... slap on the wrist .... indicting people in china ? will the Chinese extradite? hahaha ... all this and illegal Holder too!!!

http://www.nbcnews.com/news/us-news/u-s-charges-china-cyber-spying-american-firms-n108706
U.S. Charges China With Cyber-Spying on American Firms  
By Pete Williams

The Justice Department filed criminal charges against five hackers in the Chinese military Monday, accusing them of stealing American trade secrets through cyber-espionage.

The efforts were directed at six American victim companies: Westinghouse Electric, U.S. subsidiaries of SolarWorld AG, U.S. Steel, Allegheny Technologies and Alcoa. The United Steel Workers union was also targeted.

Each of the alleged hackers was hit with 31 criminal counts for a conspiracy that stretched back eight years, officials said.

“This is a case alleging economic espionage by members of the Chinese military and represents the first-ever charges against a state actor for this type of hacking,” Attorney General Eric Holder said.

"Enough is enough," Holder said at a press conference.

FBI Director James Comey told NBC News, “For too long, the Chinese government has blatantly sought to use cyber-espionage to obtain economic advantage for its state-owned industries.”

The FBI tracked the computer attacks to Unit 61398 of the Third Department of the People's Liberation Army, headquartered in a building in Shanghai, officials said.

Authorities said what amounted to "21st century burglary" benefited the Chinese competitors of the U.S. victims, including state-run enterprises, and led to the loss of American jobs.
...
It's unclear how the hackers would be brought to justice in the United States. In a separate case, the feds also have charged the makers of malicious software used by hackers, Holder announced at the press conference.
...
"Chinese actors are the world's most active and persistent perpetrators of economic espionage," said the Office of the National Counterintelligence Executive, a U.S. government agency, in a 2011 report.
...
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #42 on: February 16, 2015, 11:51:34 AM »
Let's see " the smartest minds on the planet were WRONG? ... hmmm ....

And NOW we see the errors of our ways - after it's too late???  No we were not traitors ... No we took no pay offs ...
 


http://www.washingtontimes.com/news/2015/feb/2/china-conducting-100-year-ruse-deceive-west-provid/?page=all
China conducting 100-year ruse to deceive west into providing support
Writer: Secret strategy put ‘superhawks’ on path to top U.S.


By Bill Gertz and The Washington Free Beacon  - The Washington Times - Monday, February 2, 2015

China launched a secret 100-year modernization program that deceived successive U.S. administrations into unknowingly promoting Beijing’s strategy of replacing the U.S.-led world order with a Chinese communist-dominated economic and political system, according to a new book by a longtime Pentagon China specialist.

For more than four decades, Chinese leaders lulled presidents, cabinet secretaries, and other government analysts and policymakers into falsely assessing China as a benign power deserving of U.S. support, says Michael Pillsbury, the Mandarin-speaking analyst who has worked on China policy and intelligence issues for every U.S. administration since Richard Nixon.

The secret strategy, based on ancient Chinese statecraft, produced a large-scale transfer of cash, technology and expertise that bolstered military and Communist Party “superhawks” in China who are now taking steps to catch up to and ultimately surpass the United States, Mr. Pillsbury concludes in his book “The Hundred Year Marathon,” published this week.

The Chinese strategic deception program was launched by Mao Zedong in 1955 and put forth the widespread belief that China is a poor, backward, inward looking country. “And therefore the United States has to help them, and give away things to them, to make sure they stay friendly,” Mr. Pillsbury said in an interview. “This is totally wrong.”
...

Mr. Pillsbury also reveals how a Chinese government defector exposed Beijing’s effective lobbying campaign from 1995 to 2000 that led Congress to approve Most-Favored National trade status for China — several years after China was sanctioned for the bloody massacre by the military of unarmed protesters in Beijing’s Tiananmen Square.

The covert influence operation was carried out at a time when American concerns about Chinese human rights violations were high. Yet China was able to successfully induce U.S. leaders into making key strategic trade concessions.

That covert influence program was revealed by one of the six Chinese defectors Mr. Pillsbury questioned over the years, including one who turned out to be a false defector — FBI informant Katrina Leung, who was arrested in 2003.
...

Read more: http://www.washingtontimes.com/news/2015/feb/2/china-conducting-100-year-ruse-deceive-west-provid/#ixzz3RvYy6S4w
Follow us: @washtimes on Twitter

| - - -


The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower Hardcover  – February 3, 2015

by Michael Pillsbury   (Author)


One of the U.S. government’s leading China experts reveals the hidden strategy fueling that country’s rise – and how Americans have been seduced into helping China overtake us as the world’s leading superpower.

For more than forty years, the United States has played an indispensable role helping the Chinese government build a booming economy, develop its scientific and military capabilities, and take its place on the world stage, in the belief that China’s rise will bring us cooperation, diplomacy, and free trade. But what if the "China Dream" is to replace us, just as America replaced the British Empire, without firing a shot?

Based on interviews with Chinese defectors and newly declassified, previously undisclosed national security documents, The Hundred-Year Marathon reveals China’s secret strategy to supplant the United States as the world’s dominant power, and to do so by 2049, the one-hundredth anniversary of the founding of the People’s Republic. Michael Pillsbury, a fluent Mandarin speaker who has served in senior national security positions in the U.S. government since the days of Richard Nixon and Henry Kissinger, draws on his decades of contact with the "hawks" in China’s military and intelligence agencies and translates their documents, speeches, and books to show how the teachings of traditional Chinese statecraft underpin their actions. He offers an inside look at how the Chinese really view America and its leaders – as barbarians who will be the architects of their own demise.

Pillsbury also explains how the U.S. government has helped – sometimes unwittingly and sometimes deliberately – to make this "China Dream" come true, and he calls for the United States to implement a new, more competitive strategy toward China as it really is, and not as we might wish it to be. The Hundred-Year Marathon is a wake-up call as we face the greatest national security challenge of the twenty-first century

...

"The Hundred-Year Marathon is based on work that Michael Pillsbury did for the CIA that landed him the Director’s Exceptional Performance Award. It is a fascinating chronicle of his odyssey from the ranks of the ‘panda-huggers’ to a principled, highly informed, and lonely stance alerting us to China’s long-term strategy of achieving dominance. He shows that we face a clever, entrenched, and ambitious potential enemy, suffused with the shrewdness of Sun Tzu conducting a determined search for the best way to sever our Achilles’ heel. We have vital work to do, urgently."—R. James Woolsey, former Director of Central Intelligence and chairman of the Foundation for Defense of Democracies



About the Author


Michael Pillsbury is the director of the Center on Chinese Strategy at the Hudson Institute and has served in presidential administrations from Richard Nixon to Barack Obama
. Educated at Stanford and Columbia Universities, he is a former analyst at the RAND Corporation and research fellow at Harvard and has served in senior positions in the Defense Department and on the staff of four U.S. Senate committees. He is a member of the Council on Foreign Relations and the International Institute for Strategic Studies. He lives in Washington, D.C.

| - - - - - -

http://www2.gwu.edu/~nsarchiv/nsa/publications/china-us/
China and the United States
From Hostility to Engagement, 1960-1998


China and the United States: From Hostility to Engagement, 1960-1998 publishes together for the first time recent unclassified and newly declassified documents pertaining to the formulation and implementation of the United States' policies toward the People's Republic of China and Taiwan over the last four decades, indexed for maximum accessibility.

This set reproduces on microfiche over 2,000 memoranda and policy studies, diplomatic cables, briefing and information papers, transcripts of conversations between key Chinese and U.S. officials, written communications between U.S. and Chinese officials, government-to-government agreements, and intelligence reports and studies.

The collection includes top-secret studies of the feasibility of preempting China's 1964 atomic test by destroying Chinese nuclear facilities, the verbatim transcript of President Nixon's historic first meeting with Chairman Mao Zedong, secret U.S. embassy reporting on China's 1989 attack on protestors in Tiananmen Square, and secret biographies of Chinese civilian an military leaders prepared by the CIA and DIA.

The approximately 15,000 pages of documentation come from the National Security Council, the State Department in Washington and American Embassy in Beijing, the Defense Department, a variety of U.S. intelligence agencies, the military services and commands, the General Accounting Office, and Congressional Research Service, as well as a number of white papers on arms control and human rights from the People's Republic of China.

China and the United States presents a unique look into America's relations with the nation has become the major surviving Communist power, served as key strategic partner in the the last half of the Cold War, and has posed a major challenge for U.S. policymakers since the end of the Cold War. The documents in the collection are drawn from diverse sources, including the National Archives, presidential libraries, and most importantly, hundreds of Freedom of Information Act requests. The result of the effort is an authoritative collection which will prove of tremendous value in understanding both China and U.S. policy toward that nation.

China and the United States provides a wealth of information and documentation on key aspects of U.S.-China relations, including such extraordinary topics as:
• U.S. exploration of the possibility of destroying China's nascent nuclear weapons program
• The opening to China
• The Nixon/Kissinger-Mao/Zhou meetings in the 1970s
• U.S. policy toward Taiwan
• The U.S.-Chinese military relationship
• The evolution of U.S. China policy
• The 1989 events at Tiananmen Square
• U.S. intelligence reports on China's domestic situation, foreign policy, and military activities.

National Security Council, U.S. Security Assistance to the Republic of China: NSSM 212, January 10, 1975. TOP SECRET.

http://www.fordlibrarymuseum.gov/library/document/0310/nssm212.pdf
National Security Study Memorandum 212
October 8. 1974

SUBJECT: U. S. Security Assistance to the Republic of China

The President has directed a study of U. S. policy on the transfer of American military equipment to the Republic of China over the next three to five years. The study should define relevant U. S. interests and objectives, and should be based upon the following assumptions:
That the process of normalization in U. S.-PRC relations will continue.
That there will be no radical change in the Sino-Soviet conflict.
That the U. S. defense commitment to the Republic of China will continue.
The issues to be examined in the study should include, but not necessarily be limited to, the following:


The threat to the security of Taiwan over this period.
The roles of U. S. and ROC forces in deterring and defending against a possible PRC attack on Taiwan and the Pescadores.
--In light of these roles, the principal deficiencies in ROC defensive capabilities.
--In light of these deficiencies, and taking into account the constraints posed by the continuing normalization of U. S.-PRC relations, the study should define and evaluate policy options for further transfers of U. S. military equipment to the ROC. The evaluation should include consideration of the ROC's economic and technological ability to support the a acquisition and maintenance of new weapons systems, and should consider the possibility and feasibility of the ROC developing alternative sources of supply.

The study should be prepared by the NSC Interdepartmental Group for East Asia, which should be chaired by a representative of the Department of State. The study should be submitted to the Assistant to the President for National Security Affairs no later than November 1, 1974, for consideration by the Senior Review Group prior to consideration by the President.

Henry A. Kissinger

| - - -

http://nypost.com/2015/02/08/chinas-secret-plan-to-topple-the-us-as-the-worlds-superpower/

...
It was in this article that Pillsbury first saw the term “Assassin’s Mace,” which refers to a weapon from Chinese folklore that guarantees a small combatant victory over a larger, more powerful opponent.

The article described goals including “electromagnetic combat superiority” that would allow for “naval victory,” and “tactical laser weapons” that would “be used first in anti-missile defense systems.” They also discussed jamming and destroying radar and various communications systems, and the use of computer viruses.

In time, Pillsbury began seeing the term “Assassin’s Mace” with regularity in Chinese documents.

“In the military context,” he writes, “Assassin’s Mace refers to a set of asymmetric weapons that allow an inferior power to defeat a seemingly superior adversary by striking at an enemy’s weakest point.”

...
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #43 on: May 19, 2015, 12:40:00 PM »
http://www.usatoday.com/story/news/nation/2015/05/19/china-espionage-technology/27570735/
Chinese professors among 6 charged with economic espionage
Kevin Johnson, USA TODAY 10:18 a.m. EDT May 19, 2015

WASHINGTON --Two Chinese professors are among six Chinese nationals accused by federal prosecutors of economic espionage sponsored by their home government in the alleged theft of sensitive radio frequency filter technology developed by two U.S. companies.

The professors, who attended the University of Southern California, allegedly obtained the trade secret information-- designed in part to limit interference in mobile phone reception and other devices-- as part of a "long-running effort'' to benefit universities and companies controlled by the Chinese government.

Tianjin University professor Hao Zhang, 36, was arrested Saturday in Los Angeles shortly after stepping off a plane from China. Fellow professor Wei Pang, 35, and four other alleged co-conspirators are believed to be in China.

According to the 32-count indictment, Pang and Zhang met during their doctoral studies in electrical engineering at USC. While at the university, the two conducted research related to the acoustic technology that was funded by the U.S. Defense Advanced Research Projects Agency, known as DARPA.

Shortly after earning their doctorates in 2005, Pang was employed as an engineer by Colorado-based Avago Technologies, while Zhang went to work for Skyworks Solutions Inc., in Massachusetts, the two companies that developed the proprietary trade information.

Specifically, the so-called FBAR technology is primarily used in mobile devices, filtering incoming and outgoing wireless signals so that a user only receives and transmits communications intended by the user. In addition to the consumer uses, FBAR technology has numerous applications for military and defense communications.
...

The following year, according to federal prosecutors, Pang and Zhang resigned from their U.S. companies and accepted professorships with Tianjin University where a joint venture, ROFS Microsystem, was formed to mass produce the filter technology.

"The defendants leveraged their access to and knowledge of sensitive U.S. technologies to illegally obtain and share U.S. trade secrets with the PRC for economic advantage,"
said Assistant Attorney General John Carlin, who oversees the Justice Department's National Security Division. "Economic espionage imposes great costs on American businesses, weakens the global marketplace and ultimately harms U.S. interests worldwide.''

David Johnson, the FBI's top agent in San Francisco, said the suspects' alleged conduct represented "a methodical and relentless effor by foreign interests to obtain and exploit sensitive and valuable U.S. technology.''

"Complex foreign-government sponsored schemes, such as the activity identified here, inflict irreversible damage to the economy of the United States and undercut our national security,'' Johnson said.

| - - - - - -

http://www.justice.gov/opa/pr/chinese-professors-among-six-defendants-charged-economic-espionage-and-theft-trade-secrets
Chinese Professors Among Six Defendants Charged with Economic Espionage and Theft Of Trade Secrets for Benefit of People’s Republic of China

FOR IMMEDIATE RELEASE
Tuesday, May 19, 2015

Chinese Professors Alleged to Have Stolen Valuable Technology from Avago Technologies and Skyworks Solutions to Benefit a PRC University

On May 16, 2015, Tianjin University Professor Hao Zhang was arrested upon entry into the United States from the People’s Republic of China (PRC) in connection with a recent superseding indictment in the Northern District of California, announced Assistant Attorney General for National Security John P. Carlin, U.S. Attorney Melinda Haag of the Northern District of California and Special Agent in Charge David J. Johnson of the FBI’s San Francisco Division.


The 32-count indictment, which had previously been sealed, charges a total of six individuals with economic espionage and theft of trade secrets for their roles in a long-running effort to obtain U.S. trade secrets for the benefit of universities and companies controlled by the PRC government.

“According to the charges in the indictment, the defendants leveraged their access to and knowledge of sensitive U.S. technologies to illegally obtain and share U.S. trade secrets with the PRC for economic advantage,” said Assistant Attorney General Carlin.  “Economic espionage imposes great costs on American businesses, weakens the global marketplace and ultimately harms U.S. interests worldwide.  The National Security Division will continue to relentlessly identify, pursue and prosecute offenders wherever the evidence leads.  I would like to thank all the agents, analysts and prosecutors who are responsible for this indictment.”

“As today’s case demonstrates, sensitive technology developed by U.S. companies in Silicon Valley and throughout California continues to be vulnerable to coordinated and complex efforts sponsored by foreign governments to steal that technology,” said U.S. Attorney Haag.  “Combating economic espionage and trade secret theft remains one of the top priorities of this Office.”

“The conduct alleged in this superseding indictment reveals a methodical and relentless effort by foreign interests to obtain and exploit sensitive and valuable U.S. technology through the use of individuals operating within the United States,” said Special Agent in Charge Johnson.  “Complex foreign-government sponsored schemes, such as the activity identified here, inflict irreversible damage to the economy of the United States and undercut our national security.  The FBI is committed to rooting out industrial espionage that puts U.S. companies at a disadvantage in the global market.”

According to the indictment, PRC nationals Wei Pang and Hao Zhang met at a U.S. university in Southern California during their doctoral studies in electrical engineering.  While there, Pang and Zhang conducted research and development on thin-film bulk acoustic resonator (FBAR) technology under funding from U.S. Defense Advanced Research Projects Agency (DARPA).  After earning their doctorate in approximately 2005, Pang accepted employment as an FBAR engineer with Avago Technologies (Avago) in Colorado and Zhang accepted employment as an FBAR engineer with Skyworks Solutions Inc. (Skyworks) in Massachusetts.  The stolen trade secrets alleged in the indictment belong to Avago or Skyworks.

Avago is a designer, developer and global supplier of FBAR technology, which is a specific type of radio frequency (RF) filter.  Throughout Zhang’s employment, Skyworks was also a designer and developer of FBAR technology.  FBAR technology is primarily used in mobile devices like cellular telephones, tablets and GPS devices.  FBAR technology filters incoming and outgoing wireless signals so that a user only receives and transmits the specific communications intended by the user.  Apart from consumer applications, FBAR technology has numerous applications for a variety of military and defense communications technologies.

According to the indictment, in 2006 and 2007, Pang, Zhang and other co-conspirators prepared a business plan and began soliciting PRC universities and others, seeking opportunities to start manufacturing FBAR technology in China.  Through efforts outlined in the superseding indictment, Pang, Zhang and others established relationships with officials from Tianjin University.  Tianjin University is a leading PRC Ministry of Education University located in the PRC and one of the oldest universities in China.

As set forth in the indictment, in 2008, officials from Tianjin University flew to San Jose, California, to meet with Pang, Zhang and other co-conspirators.  Shortly thereafter, Tianjin University agreed to support Pang, Zhang and others in establishing an FBAR fabrication facility in the PRC.  Pang and Zhang continued to work for Avago and Skyworks in close coordination with Tianjin University.  In mid-2009, both Pang and Zhang simultaneously resigned from the U.S. companies and accepted positions as full professors at Tianjin University.  Tianjin University later formed a joint venture with Pang, Zhang and others under the company name ROFS Microsystem intending to mass produce FBARs.

The indictment alleges that Pang, Zhang and other co-conspirators stole recipes, source code, specifications , presentations, design layouts and other documents marked as confidential and proprietary from the victim companies and shared the information with one another and with individuals working for Tianjin University.

According to the indictment, the stolen trade secrets enabled Tianjin University to construct and equip a state-of-the-art FBAR fabrication facility, to open ROFS Microsystems, a joint venture located in PRC state-sponsored Tianjin Economic Development Area (TEDA), and to obtain contracts for providing FBARs to commercial and military entities.

The six indicted defendants include:
•Hao Zhang, 36, a citizen of the PRC, is a former Skyworks employee and a full professor at Tianjin University.  Zhang is charged with conspiracy to commit economic espionage, conspiracy to commit theft of trade secrets, economic espionage and theft of trade secrets.  Zhang was arrested upon entry into the United States on May 16, 2015.
•Wei Pang, 35, a citizen of the PRC, is a former Avago employee and a full professor at Tianjin University.  Pang is charged with conspiracy to commit economic espionage, conspiracy to commit theft of trade secrets, economic espionage and theft of trade secrets.
•Jinping Chen, 41, a citizen of the PRC, is a professor at Tianjin University and a member of the board of directors for ROFS Microsystems.  Chen is charged with conspiracy to commit economic espionage and conspiracy to commit theft of trade secrets.
•Huisui Zhang (Huisui), 34, a citizen of the PRC, studied with Pang and Zhang at a U.S. university in Southern California and received a Master’s Degree in Electrical Engineering in 2006.  Huisui is charged with conspiracy to commit economic espionage and conspiracy to commit theft of trade secrets.
•Chong Zhou, 26, a citizen of the PRC, is a Tianjin University graduate student and a design engineer at ROFS Microsystem.  Zhou studied under Pang and Zhang, and is charged with conspiracy to commit economic espionage, conspiracy to commit theft of trade secrets, economic espionage and theft of trade secrets.
•Zhao Gang, 39, a citizen of the PRC, is the General Manager of ROFS Microsystems.  Gang is charged with conspiracy to commit economic espionage and conspiracy to commit theft of trade secrets.

Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #44 on: October 27, 2015, 06:37:36 PM »
http://news.usni.org/2015/10/27/chinas-military-built-with-cloned-weapons
China’s Military Built with Cloned Weapons
By: US Naval Institute Staff
October 27, 2015 4:45 AM

...  China has earned an international reputation in recent decades as being the home of a prolific copycat culture.

The Chinese have become proficient at cloning products ranging from designer handbags and the latest smartphones to movies and alcoholic beverages. Fake Apple stores, counterfeit KFC restaurants and imitation IKEA big-box outlets dot the Chinese landscape. They have even built entire replica European towns.

Some Western observers believe this cultural attitude towards imitation is rooted in Confucianism where followers traditionally learned by replicating masterworks and then tried to improve upon them.

The fact that the Chinese commonly refer to today’s imitation products as “Shanzhai” indicates that they recognize the dubious nature of the current practice. The term “Shanzhai” translates to “mountain stronghold” and was originally applied to pirate factories producing counterfeit goods in remote areas beyond the reach of regulatory control.

The copycat business is no longer restricted to outlying lawless regions. It has entered the mainstream and been embraced by government officials who seem content to allow other nations to develop products and technology which they can then acquire legitimately through licensing or illegitimately through counterfeiting and espionage. This approach allows China to stay competitive on the world stage while saving them the time and money it would cost to develop their own products.


An industry in which Chinese cloning has excelled to a disconcerting degree is the manufacture of weapon systems. China’s expanding military and growing assertiveness has been bolstered by weapons cloned from the arsenals of other countries. Bleeding edge U.S. aircraft including the Lockheed Martin F-35 Joint Strike Fighter and Northrop Grumman X-47B unmanned combat air vehicle (UCAV) have Chinese counterparts that are remarkably similar. Some of the technology used in these designs was almost certainly acquired through a vigorous Chinese cyber spying campaign.

U.S. Defense officials have stated that Chinese military hackers undertaking “technical reconnaissance” have succeeded in pilfering highly classified technical documents on a number of occasions. The sensitive technical data that is known to have been compromised is now evident in the latest versions of several Chinese weapons.

Officials also suspect that China has managed to obtain valuable technical advances by making backroom deals with U.S. allies that bought American weapons. It is for this reason that the U.S. decided not to export the Lockheed Martin F-22 Raptor stealth fighter.

It is not only American weapon designs and technology that have been stolen and replicated by the Chinese. Russia has at times served as China’s unwitting research and development department. After the collapse of the Soviet Union, Russia was in need of money and held a fire sale of its state of the art Sukhoi Su-27 fighter. China bought two dozen of the fighters but later negotiated for a license to assemble additional planes domestically using key components imported from Russia. Within a few years China claimed that the fighter no longer met their needs and canceled the contract. To the fury of the Russians, the Chinese soon debuted the indigenously built and equipped Shenyang J-11B fighter that looks identical to the Su-27.
...
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #45 on: June 29, 2016, 12:42:43 PM »
look at previous posts ...

Who is WILLIAM A. REINSCH? (CFR member)  a total slime bag...

http://www.uscc.gov/about/commissioners/reinpg.php

William A. Reinsch was reappointed to the Commission by Senate Majority Leader Harry Reid for a fifth term expiring December 31, 2009.

Update: Chairman William Reinsch was reappointed to the Commission by Senate Democratic Leader Harry Reid for a term expiring December 31, 2011 and elected Chairman for the 2011 report cycle


| - - --

Where is this traitor to the USA  now?

http://www.cipe.org/content/william-reinsch

William A. Reinsch

Bill Reinsch currently serves as President of the National Foreign Trade Council.

The NFTC, founded in 1914, is the oldest and largest business association dedicated solely to trade policy, export finance, international tax, and human resource issues. The organization represents 300 companies through its offices in New York and Washington, D.C. As president, Reinsch oversees NFTC’s efforts in favor of open markets, in support of Eximbank and OPIC, against unilateral sanctions and in support of sound international tax policy, among many other international trade and tax issues of concern to U.S. business.

Concurrently, Mr. Reinsch also serves as a member of the U.S.-China Security Review Commission.

Prior to joining the NFTC, Reinsch served as the Under Secretary for Export Administration in the U.S. Department of Commerce. In that position he administered and enforced the export control policies and anti-boycott laws of the U.S. government and monitored the condition of the nation’s defense industrial base. Prior to taking this position, Mr. Reinsch spent twenty years on Capitol Hill from 1973 to 1993, most of them as senior Legislative Assistant to the late Senator John Heinz and subsequently to Senator John D. Rockefeller IV. He received a B.A. in International Relations from The Johns Hopkins University and an M.A. degree from The Johns Hopkins School of Advanced International Studies. He lives in Bethesda, Maryland, with his wife and two sons.

http://www.washingtontimes.com/news/2014/nov/26/inside-the-ring-william-reinsch-says-china-is-dang/
Confessions of a panda hugger

William A. Reinsch, National Foreign Trade Council President. CSPAN
 By Bill Gertz - - Wednesday, November 26, 2014

William A. Reinsch, former undersecretary of commerce for export administration under President Bill Clinton, offered a surprising mea culpa in the latest annual report by the U.S.- China Economic and Security Review Commission made public earlier this month.

Once among the more dovish U.S. officials toward China, Mr. Reinsch, the commission’s vice chairman, has described China as “dangerous.”

“It is a real disappointment for me to write these things,” Mr. Reinsch stated in an “Additional Views” section. “I have always been an optimist about the relationship, but that view is becoming increasingly untenable, as China asserts itself in ways that are inevitably going to bump up against our interests in the region and in multilateral fora.”
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #46 on: August 07, 2016, 12:58:14 PM »
One must ask the question - Why does "our" govt. take such security risks with non-native born citizens?
One must conclude THEY DO NOT TRUST THE NATIVE BORN CITIZEN.  ( Because they are going to be asked to commit illegal un constitutional acts.) 

The naturalized people are easily manipulated to do anything regardless of law and are easily blackmailed and easily turned to be double plus agents and assets .


http://breaking911.com/fbi-employee-pleads-guilty-acting-agent-china-new-details/
FBI Employee Pleads Guilty To Acting As Agent Of China
August 1, 2016 | 3:04 PM

Defendant Collected and Caused Sensitive FBI Information to be Provided to the Chinese Government

Kun Shan Chun, a native of the People’s Republic of China and a naturalized U.S. citizen, pleaded guilty today to a criminal information charging him with acting in the United States as an agent of China without providing prior notice to the Attorney General.

Chun, aka Joey Chun, 46, pleaded guilty before U.S. Magistrate Judge James C. Francis IV of the Southern District of New York. He was an employee of the FBI until his arrest on March 16, 2016.
...

According to the complaint, the information and statements made during today’s court proceeding:

In approximately 1997, Chun began working at the FBI’s New York Field Office as an electronics technician assigned to the Computerized Central Monitoring Facility of the FBI’s Technical Branch.

In approximately 1998, and in connection with his employment, the FBI granted Chun a Top Secret security clearance and his duties included accessing sensitive, and in some instances classified, information.

In connection with a progressive recruitment process, Chun received and responded to taskings from Chinese nationals and at least one Chinese government official (Chinese Official-1), some, if not all, of whom were aware that Chun worked at the FBI.

On multiple occasions prior to his arrest in March 2016, at the direction of Chinese government officials, Chun collected sensitive FBI information and caused it to be transmitted to Chinese Official-1 and others, while at the same time engaging in a prolonged and concerted effort to conceal from the FBI his illicit relationships with these individuals.

Beginning in 2006, Chun and some of his relatives maintained relationships with Chinese nationals purporting to be affiliated with a company in China named Zhuhai Kolion Technology Company Ltd. (Kolion). Chun maintained an indirect financial interest in Kolion, including through a previous investment by one of his parents. In connection with these relationships, Chinese nationals asked Chun to perform research and consulting tasks in the United States, purportedly for the benefit of Kolion, in exchange for financial benefits, including partial compensation for international trips.
...

On multiple occasions, Chinese Official-1 asked Chun for information regarding the FBI’s internal structure. In approximately March 2013, Chun downloaded an FBI organizational chart from his FBI computer in Manhattan. Chun later admitted to the FBI that, after editing the chart to remove the names of FBI personnel, he saved the document on a piece of digital media and caused it to be transported to Chinese Official-1 in China.
...
Chinese Official-1 also asked Chun for information regarding technology used by the FBI. In approximately January 2015, Chun took photos of documents displayed in a restricted area of the FBI’s New York Field Office, which summarized sensitive details regarding multiple surveillance technologies used by the FBI. Chun sent the photographs to his personal cell phone and later admitted to the FBI that he caused the photographs to be transported to Chinese Official-1 in China.
...
...
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #47 on: August 24, 2016, 12:59:22 PM »
http://bigstory.ap.org/article/a3a0ef1087ad469e8aff5be4d37f8981/china-sets-sights-new-global-export-nuclear-energy

China sets sights on new global export: nuclear energy
By JOE McDONALD
Aug. 24, 2016 12:11 AM EDT

EIJING (AP) — On a seaside field south of Shanghai, workers are constructing a nuclear reactor that is the flagship for Beijing's ambition to compete with the United States, France and Russia as an exporter of atomic power technology.

The Hualong One, developed by two state-owned companies, is one multibillion-dollar facet of the Communist Party's aspirations to transform China into a creator of profitable technology from mobile phones to genetics.

In the case of nuclear reactors, industry experts say China is underestimating how tough it will be for its novice exporters to compete with the foreign companies that helped create its industry, given the political hurdles, safety concerns and uncertain global demand following Japan's Fukushima disaster.

China's government-run nuclear industry is based on foreign technology but has spent two decades developing its own with help from Westinghouse Electric Co., France's Areva and EDF and other partners.

A separate export initiative is based on an alliance between Westinghouse and a state-owned reactor developer.

The industry is growing fast, with 32 reactors in operation, 22 being built and more planned, according to the World Nuclear Association, an industry group. China accounted for eight of 10 reactors that started operation last year and six of eight construction starts.

...

Abroad, builders broke ground in Pakistan last year for a power plant using a Hualong One, supported by a $6.5 billion Chinese loan. Also last year, Argentina signed a contract to use the reactor in a $15 billion plant financed by Chinese banks.

...

Other global suppliers include GE Hitachi Nuclear Energy, South Korea's KEPCO, Canada's Candu Energy Inc. and Russia's Atomstroyexport.

Westinghouse transferred technology for its latest reactor, the AP1000, to China's State Nuclear Power Technology Corp. in 2007 as part of a transaction that included the sale of four reactors.

The AP1000 became the basis for future Chinese reactor development, and Westinghouse agreed to jointly sell those reactors with SNPTC. The Chinese partner, which merged with another state company to form the State Power Investment Corp. last year, also developed its own, bigger version, the CAP1400.

The two companies are in talks with Turkey about selling four reactors based on the AP1000.

The AP1000 has been approved by U.S. and British regulators, Benjamin said, while the CAP1400 is just beginning the review process.

"We look forward to participating in the China market for many years to come," he said, adding, "there will be markets either SPIC on their own or Westinghouse on our own might not have access to, but together we can gain access."
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #48 on: November 23, 2016, 03:00:16 PM »
http://www.nytimes.com/2016/11/22/technology/facebook-censorship-tool-china.html
Facebook Said to Create Censorship Tool to Get Back Into China
By MIKE ISAACNOV. 22, 2016

SAN FRANCISCO — Mark Zuckerberg, Facebook’s chief executive, has cultivated relationships with China’s leaders, including President Xi Jinping. He has paid multiple visits to the country to meet its top internet executives. He has made an effort to learn Mandarin.

Inside Facebook, the work to enter China runs far deeper.

The social network has quietly developed software to suppress posts from appearing in people’s news feeds in specific geographic areas, according to three current and former Facebook employees, who asked for anonymity because the tool is confidential. The feature was created to help Facebook get into China, a market where the social network has been blocked, these people said. Mr. Zuckerberg has supported and defended the effort, the people added.
....

Facebook has restricted content in other countries before, such as Pakistan, Russia and Turkey, in keeping with the typical practice of American internet companies that generally comply with government requests to block certain content after it is posted. Facebook blocked roughly 55,000 pieces of content in about 20 countries between July 2015 and December 2015, for example. But the new feature takes that a step further by preventing content from appearing in feeds in China in the first place.

Facebook does not intend to suppress the posts itself. Instead, it would offer the software to enable a third party — in this case, most likely a partner Chinese company — to monitor popular stories and topics that bubble up as users share them across the social network, the people said. Facebook’s partner would then have full control to decide whether those posts should show up in users’ feeds.

President Xi Jinping of China, center, speaking with Mark Zuckerberg, right, the chief executive of Facebook, and Lu Wei, China’s Internet czar at the time, in 2015 at a gathering at Microsoft’s campus in Redmond, Wash. Credit Pool photo by Ted S. Warren
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
Re: China Spying - Technology Transfers History
« Reply #49 on: February 23, 2017, 06:13:38 PM »
http://www.dailymail.co.uk/news/article-4251046/Illegal-Clinton-fundraiser-tape-fearing-life.html

EXCLUSIVE: Illegal fundraiser for the Clintons made secret tape because he feared being ASSASSINATED over what he knew - and used it to reveal Democrats' bid to silence him

    DailyMail.com has obtained a video in which convicted illegal Clinton fundraisers Johnny Chung gave secret testimony while in fear of his life
    The Chinese-American was convicted of funneling money to Bill Clinton's 1996 re-election bid in a breach of campaign finance law known as 'Chinagate'
    Now new book revealed how he spilled details of his activities in a video he made because he thought a squad of assassins would come after him 
    He made the video with a friend after his FBI protection detail was suddenly removed - which Chung said on the tape shocked even his judge
    Chung feared meeting same fate as Ron Brown, Clinton commerce secretary, who died in plane crash, friend who made the tape reveals
    Video is revealed in new book about the Chinagate scandal

By Alana Goodman For Dailymail.com
Published: 15:33 EST, 23 February 2017 | Updated: 15:56 EST, 23 February 2017

 Chinese-American businessman at the center of a Clinton campaign finance scandal secretly filmed a tell-all video as an 'insurance policy' - because he feared being murdered.
In footage provided exclusively to DailyMail.com, Johnny Chung spills details on how he illegally funneled money from Chinese officials to Bill Clinton's 1996 re-election bid.
The Chinese-American Clinton fundraiser recorded the 'elaborate videotaped testimony' while in hiding in 2000.
He smuggled it to trusted friends and family with instructions to release it to the media in the event of his untimely death because he believed he was at risk of being assassinated.

Chung is believed to still be alive and living in China.

The video was obtained by author and historian David Wead for his new book Game of Thorns, which traces Hillary Clinton's unsuccessful 2016 campaign and the Chinese government's long-running operation to buy political influence in Washington.


...

The video grew out of a controversy in the mid-1990s when evidence surfaced that Chinese officials were pouring hundreds of thousands into then president Bill Clinton's reelection campaign through American straw donors.

Chung, one of the main players in the 'Chinagate' scandal, was accused of giving over $300,000 to the Democratic National Committee on behalf of the head of China's military intelligence agency during Clinton's reelection bid.

Chung cooperated with the Department of Justice during the investigation, and was sentenced to five years of probation for campaign finance violations, bank fraud and tax evasion in 1998.
...

After Chung agreed to cooperate with prosecutors on the Chinagate investigation, he feared his knowledge of the Clinton campaign finance scandal and the Chinese influence operation could make him a target for assassination.
...

The FBI in Los Angeles began providing around-the-clock protection for him. But just a few days before Chung was scheduled to testify before a grand jury, the FBI headquarters in Washington called off the protection detail and told Chung he would have to make the trip alone.

In the secret videotaped statement, Chung claimed the Department of Justice dismissed his safety concerns – with one U.S. attorney telling him to 'call 911' if he felt threatened.

...
In total he visited the White House 57 times in a two-year span – eight of these meetings were 'off the books.'

Most of the meetings were with Hillary Clinton or her staff. During one of these trips, Chung personally handed a $50,000 check to Hillary Clinton's chief of staff Maggie Williams.

Chung even helped arrange for Bill Clinton to meet with the source of the money – a top Chinese military official – at a Los Angeles fundraiser.

After Chung's activities caught the attention of federal authorities, Democrats quickly distanced themselves from the onetime fundraiser.
,...

Read more: http://www.dailymail.co.uk/news/article-4251046/Illegal-Clinton-fundraiser-tape-fearing-life.html#ixzz4ZYL4pZqQ
Follow us: @MailOnline on Twitter | DailyMail on Facebook

...

Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 16,759
    • View Profile
    • Email
    • Personal Message (Online)
bump AJ covering today ...
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5