Intermarkets' Privacy Policy
Support


Donate to Ace of Spades HQ!


Contact
Ace:
aceofspadeshq at gee mail.com
Buck:
buck.throckmorton at protonmail.com
CBD:
cbd at cutjibnewsletter.com
joe mannix:
mannix2024 at proton.me
MisHum:
petmorons at gee mail.com
J.J. Sefton:
sefton at cutjibnewsletter.com


Recent Entries
Absent Friends
Bandersnatch 2024
GnuBreed 2024
Captain Hate 2023
moon_over_vermont 2023
westminsterdogshow 2023
Ann Wilson(Empire1) 2022
Dave In Texas 2022
Jesse in D.C. 2022
OregonMuse 2022
redc1c4 2021
Tami 2021
Chavez the Hugo 2020
Ibguy 2020
Rickl 2019
Joffen 2014
AoSHQ Writers Group
A site for members of the Horde to post their stories seeking beta readers, editing help, brainstorming, and story ideas. Also to share links to potential publishing outlets, writing help sites, and videos posting tips to get published. Contact OrangeEnt for info:
maildrop62 at proton dot me
Cutting The Cord And Email Security
Moron Meet-Ups






















« So that's why they call it the "City of Lights!" | Main | Worst Night of Rioting Yet In France »
November 05, 2005

Danger Averted?

Friday before last, October 28th, Tai Wang Mak, and his wife, both resident aliens and Chinese citizens, sat nervously at LAX, waiting to board a flight to Hong Kong.

I’m sure Hong Kong is lovely this time of year, and a getaway would have been nice, but sadly, they never made it on board.

The reason? A problem with their carry-on baggage.

Apparently, it included several encrypted CDs which Tai Wang had received from his brother, Chi Mak - lead project engineer on our naval “Quiet Electric Drive” system (our real world version of the silent propulsion the Ruskies had in Red October.)

Yes, the disks contained information on the Q.E.D. project which they were intending to pass along to the Chinese military after Tai caught his connecting flight to Guangzhou.

Those are the details that are just emerging now as the arrest warrant's affidavits become public. You can read news accounts here, here and here. (though I wouldn't bother)

To get the full background on what was really happening, you’d have to turn to Bill Gertz, Washington Times reporter/favored intelligence community leakee.

He explains, today, that this wasn’t quite the “Pfew, disaster averted!” moment the other pieces might lead you to believe. In fact, Chi Mak and his brother weren’t just one-time spies we caught at the last moment. No, the engineer and his family had been running an incredibly damaging espionage ring since 1990.

How damaging? Here's a taste:

Key compromises uncovered so far include sensitive data on Aegis battle management systems that are the core of U.S. Navy destroyers and cruisers.

China covertly obtained the Aegis technology and earlier this year deployed its first Aegis warship, code-named Magic Shield, intelligence officials have said.

The Chinese also obtained sensitive data on U.S. submarines, including classified details related to the new Virginia-class attack submarines.

Officials said based on a preliminary assessment, China now will be able to track U.S. submarines, a compromise that potentially could be devastating if the United States enters a conflict with China in defending Taiwan.
...

China also is thought to have obtained information from the spy ring that will assist Chinese military development of electromagnetic pulse weapons -- weapons that simulate the electronic shock caused by a nuclear blast -- that disrupt electronics.

It also is thought to have obtained unmanned aerial vehicle technology from the spy ring.

To put this in context, why these leaks were so harmful, it’s useful to turn to Gertz again.

This longish July article makes clear China has intentions on Taiwan. This is absolutely nothing new (although it explains a little of their strategy in bringing it about), but the piece will help make concrete how these naval leaks will have dire, real world consequences. Military advantages we’d been counting on have been lost.


The July article on their espionage efforts:

China is stepping up its overt and covert efforts to gather intelligence and technology in the United States, and the activities have boosted Beijing's plans to rapidly produce advanced-weapons systems.

"I think you see it where something that would normally take 10 years to develop takes them two or three," said David Szady, chief of FBI counterintelligence operations.

He said the Chinese are prolific collectors of secrets and military-related information.

"What we're finding is that [the spying is] much more focused in certain areas than we ever thought, such as command and control and things of that sort," Mr. Szady said.

"In the military area, the rapid development of their 'blue-water' navy -- like the Aegis weapons systems -- in no small part is probably due to some of the research and development they were able to get from the United States," he said.

The danger of Chinese technology acquisition is that if the United States were called on to fight a war with China over the Republic of China (Taiwan), U.S. forces could find themselves battling a U.S.-equipped enemy.

The Chinese intelligence services use a variety of methods to spy, including traditional intelligence operations targeting U.S. government agencies and defense contractors.

Additionally, the Chinese use hundreds of thousands of Chinese visitors, students and other nonprofessional spies to gather valuable data, most of it considered "open source," or unclassified information.

"What keeps us up late at night is the asymmetrical, unofficial presence," Mr. Szady said. "The official presence, too. I don't want to minimize that at all in what they are doing."

China's spies use as many as 3,200 front companies -- many run by groups linked to the Chinese military -- that are set up to covertly obtain information, equipment and technology, U.S. officials say.”
…

I think the problem is huge, and it's something that I think we're just getting our arms around," Mr. Szady said of Chinese spying. "It's been there, and what we're doing is more or less discovering it or figuring it out at this point."

For more background on the Chinese use of front companies, the Heritage Foundation, with rather nice timing, put out this release yesterday.

And if you wanna learn about the Chinese use of computer hackers to crack into the DOD's and military contractors’ computer networks, try Time Magazine’s August 28th piece “Invasion of the Chinese Cyberspies” (behind their wall, but reproduced here) An entertaining (if that's the right word) read.


All in all, scary stuff. None of it’s comforting, but if nothing else, we’re waking up to the issue.

digg this
posted by Dr. Reo Symes at 04:25 PM

| Access Comments




Recent Comments
Seems Legit: "How odd, I thought everyone understood that electr ..."

rickb223 Gold & Silver Spot Prices [s][/b][/i][/u]: "You’d think they would’ve come up with ..."

Commissar of Plenty and Lysenkoism in Solidarity with the Struggle : "MiG-29 has two sets of intakes Bonus hole. ..."

It's me donna : "270 242 To be fair, Elon did advise that there isn ..."

West Frisian Women's Auxiliary : "The red head gene mutation also enables them to dr ..."

eleven: "If there wasn't a steel re-enforced concrete wall ..."

SMOD: "DC_Draino @DC_Draino Think about this If Tr ..."

Sponge - F*ck Joe Biden: "[i]thus, his push to ship congolese lithium mining ..."

garrett: "What is the increased Mass of an Electric School B ..."

Thomas Paine: "242 To be fair, Elon did advise that there isn't e ..."

Skip : "Bet they won't get 10 years of use out of a EV Bus ..."

Sponge - F*ck Joe Biden: "[i]They handle 25% more pain than others, and repo ..."

Recent Entries
Search


Polls! Polls! Polls!
Frequently Asked Questions
The (Almost) Complete Paul Anka Integrity Kick
Top Top Tens
Greatest Hitjobs

The Ace of Spades HQ Sex-for-Money Skankathon
A D&D Guide to the Democratic Candidates
Margaret Cho: Just Not Funny
More Margaret Cho Abuse
Margaret Cho: Still Not Funny
Iraqi Prisoner Claims He Was Raped... By Woman
Wonkette Announces "Morning Zoo" Format
John Kerry's "Plan" Causes Surrender of Moqtada al-Sadr's Militia
World Muslim Leaders Apologize for Nick Berg's Beheading
Michael Moore Goes on Lunchtime Manhattan Death-Spree
Milestone: Oliver Willis Posts 400th "Fake News Article" Referencing Britney Spears
Liberal Economists Rue a "New Decade of Greed"
Artificial Insouciance: Maureen Dowd's Word Processor Revolts Against Her Numbing Imbecility
Intelligence Officials Eye Blogs for Tips
They Done Found Us Out, Cletus: Intrepid Internet Detective Figures Out Our Master Plan
Shock: Josh Marshall Almost Mentions Sarin Discovery in Iraq
Leather-Clad Biker Freaks Terrorize Australian Town
When Clinton Was President, Torture Was Cool
What Wonkette Means When She Explains What Tina Brown Means
Wonkette's Stand-Up Act
Wankette HQ Gay-Rumors Du Jour
Here's What's Bugging Me: Goose and Slider
My Own Micah Wright Style Confession of Dishonesty
Outraged "Conservatives" React to the FMA
An On-Line Impression of Dennis Miller Having Sex with a Kodiak Bear
The Story the Rightwing Media Refuses to Report!
Our Lunch with David "Glengarry Glen Ross" Mamet
The House of Love: Paul Krugman
A Michael Moore Mystery (TM)
The Dowd-O-Matic!
Liberal Consistency and Other Myths
Kepler's Laws of Liberal Media Bias
John Kerry-- The Splunge! Candidate
"Divisive" Politics & "Attacks on Patriotism" (very long)
The Donkey ("The Raven" parody)
Powered by
Movable Type 2.64