Beware of the Dragon!

PoliticalChic

Diamond Member
Gold Supporting Member
Oct 6, 2008
124,898
60,271
2,300
Brooklyn, NY
We live in a time of unsuspected dangers....a time that requires attention and competence in the President.
There is neither at 1600 Pennsylvania Avenue.




1. "General Chi Haotian is a general of the People's Liberation Army." Chi Haotian - Wikipedia, the free encyclopedia

a. "The following is the actual text of a speech delivered in December, 2005 by Comrade Chi Haotian ¬the Vice-Chairman of China's Military Commission to top officers and generals.

Keep in mind that China has for many years advocated deceitful and covert warfare against its enemies....
'It is historical destiny that China and United States will come into unavoidable confrontation on a narrow path and fight....We still need America. Therefore, we must do everything we can to promote our relationship with America, learn from ... Only by using non-destructive weapons that can kill many people will we be able to reserve America for ourselves.... It is indeed brutal to kill one or two hundred million Americans. But that is the only path that will secure a Chinese century,..." Speech by Comrade Chi Haotian Vice-Chairman of*China's Military Commission





2. Having witnessed the how rapidly the United States defeated Iraq, the Chinese know that victory will not be attained through conventional warfare. Their intended path is known as "unrestricted warfare."

a. "Unrestricted Warfare (超限战, literally "warfare beyond bounds") is a book on military strategy written in 1999 by twocolonels in the People's Liberation Army, Qiao Liang (乔良) and Wang Xiangsui (王湘穗). Its primary concern is how a nation such as China can defeat a technologically superior opponent (such as the United States) through a variety of means. Rather than focusing on direct military confrontation, this book instead examines a variety of other means.... The novels Foreign Influence and Full Black by Brad Thor are based on this book." (A major source for this post) Unrestricted Warfare - Wikipedia, the free encyclopedia

b. Surprise, deception, a warfare with no rules.






3. The life's-blood of our society is electricity. A primary target will be the electrical grids, and the Internet. There are those who attribute the 2003 blackout that hit eight states and parts of Canada, and some 55 million people, to Chinese hackers who managed to get into the US electrical power system, and installed software called Trojan horses, which they activated. A test for future attacks. "if there is a significant failure in the power grid caused by the attack, massive power outages could result, crippling industry, defense, medicine, and all other areas of life."
Ibid.

4. Another asymmetrical attack is via support of those who represent a change in cultural values to those that weaken America.
"'What you're seeing is how a civilization commits suicide," says Camille Paglia.... the diminished status of military service. "The entire elite class now, in finance, in politics and so on, none of them have military service—hardly anyone, there are a few. But there is no prestige attached to it anymore. That is a recipe for disaster," she says. "These people don't think in military ways, so there's this illusion out there that people are basically nice, people are basically kind, if we're just nice and benevolent to everyone they'll be nice too. They literally don't have any sense of evil or criminality." The Weekend Interview With Camille Paglia: A Feminist Defense of Masculine Virtues - WSJ.com






5. The obvious attempts to stall and block America's interests by actions at the United Nations.

6. Cornering and rigging markets for things America needs, such as oil and rare earth minerals.

7. Manipulating the value of the dollar, and influencing banking and the stock market.
"... in China, because the government constantly prints new currency and uses it to buy U.S. dollars and U.S. government debt, thereby flooding the market with Chinese currency and increasing demand for American dollars." China currency manipulation: How does it harm the U.S. and what can we do about it?

8. Attacking networks. Networks are increasingly important in not only data exchange but also transportation, financial institutions, and communication.





9. "Another famous instance of Unrestricted Warfare policy is terrorism. Terrorism is used by a group to gain satisfaction for certain demands. Even if these demands are not satisfied, a terrorist attack can have vastly disproportionate effects on national welfare. One only has to look at the economic crisis that followed the terrorist attacks against the United States, or the extensive security measures put in place after those same attacks.." Unrestricted Warfare - Wikipedia, the free encyclopedia





10. "The wars of the future will require what most soldiers find themselves unprepared to do: to win the unconventional wars and the battles off the battlefield. From this point of view even Generals Powell, Schwarzkopf and Shalikashvili are not "modern" but rather traditional military men. There is a big gap between the conventional and the modern. A gap that can be bridged, but only by deep thinkers. What soldiers need to do now is to be military Machiavellis." PLA Senior Colonels on Strategy and Geopolitics: Unrestricted Warfare: Part IV






This is the bulletin-board quote for our time:
"....Only by using non-destructive weapons that can kill many people will we be able to reserve America for ourselves.... It is indeed brutal to kill one or two hundred million Americans...."


Who we elect has a far more immediate effect on our lives than entitlements do.
Is the priority to be our lives and the lives of our loved ones, or our comforts and petty differences?
 
even moreso than oil, america needs to end its dependence on china
 
Interesting.... They would still have to eventually put boots on the ground though... And I hope we wouldn't just roll over.... I won't...
 
Daddy always said "beware the chinese, honey. It isn't the russians we need to keep an eye on. It's the chinese".

He said that back in the late 1950's, early 60's.
 
Some very good insight into real threats that face us. I just hope that our intelligence and spy agencies have an inside view of these potential perils. With the current administration, I find that appeasing our rivals has become more important than security concerns.
 
That speech is almost certainly a hoax, if that wasn't immediately clear to anyone reading it. It reads like a bad B-movie script.

It came from an unnamed source given to the Epoch Times, a Falun Gong anti-PRC propaganda newspaper.
 
two countries with nukes and political leaders that don't belong in an insane asylum will never go to war with one another. From here on out it will all be economic/cyber warfare between super powers.
 
That speech is almost certainly a hoax, if that wasn't immediately clear to anyone reading it. It reads like a bad B-movie script.

It came from an unnamed source given to the Epoch Times, a Falun Gong anti-PRC propaganda newspaper.




Do you use Q-tips to remove all the sand when you pull your head out?
 
Some very good insight into real threats that face us. I just hope that our intelligence and spy agencies have an inside view of these potential perils. With the current administration, I find that appeasing our rivals has become more important than security concerns.



Not as long as there are Democrat/Liberals/Progressives on the scene.....



1. "The real aberration occurred in the mid-1970s when the United States granted its legislative branch the greatest control over intelligence matters of any Western nation, and overturned the system which had prevailed in the United States since the Founding.

The damage done to the CIA by this congressional oversight regime (Democrat-controlled Pike and Church Committees) is quite extensive. The committees increased the number of CIA officials subject to Senate confirmation, condemned the agency for its contacts with unscrupulous characters, prohibited any further contact with these bad characters, insisted that the United States not engage or assist in any coup which may harm a foreign leader, and overwhelmed the agency with interminable requests for briefings (some 600 alone in 1996).

[A]s Henry Kissinger once observed about the Church Committee, that it is an illusion that “tranquility can be achieved by an abstract purity of motive for which history offers no example.” It is precisely this illusion which has prevailed in congressional circles since the heyday of Frank Church and Otis Pike. As Church himself once argued, the United States should not “fight fire with fire . . . evil with evil.”"
History News Network | Congressional Oversight and the Crippling of the CIA



2. Here at home, the Obama administration has gravely impaired our capability to gather human intelligence by declassifying hundreds of pages of documents that explain our interrogation techniques—information that is now probably in al-Qaeda training manuals. https://www.hillsdale.edu/news/imprimis/archive/issue.asp?year=2009&month=10
 
Really we are already in a cyber war with China..


Cyber attack? What cyber attack?

Those cyber attacks against the United States, the Pentagon, in particular?

Not us, says China's Minister of National Defense Gen. Chang Wanquan.

"The Chinese military has never supported any sort of hacker activities," Chang said Monday at a joint news conference at the Pentagon with Defense Secretary Chuck Hagel.

That's not the way the Pentagon sees it. In May, David Helvey, deputy assistant secretary of defense for East Asia, said that in 2012 "numerous computer systems around the world, including those owned by the United States government, continued to be targeted for intrusions, some of which appear to be attributable directly to [Chinese] government and military organizations."

Hagel didn't challenge Chang. Perhaps he was trying to be a nice host.

The Pentagon's own report to Congress was more blunt:

"In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military."


Cyber attack? What cyber attack?
 
Hello, Unit 61398

20130223_cnp501.jpg


According to the report, a Shanghai-based unit of the People’s Liberation Army General Staff Department, known as Unit 61398, is staffed by hundreds and possibly thousands of people specially trained in network security, digital signal processing, covert communications and English linguistics. The unit’s 12-storey building (pictured above) has been equipped with special fibre-optic communications infrastructure “in the name of national defence”.

Mandiant said that since 2006, it has observed attacks from this unit against at least 141 companies spanning 20 major industries, including four of the seven strategic emerging industries that China has identified in its current five-year plan.

The New York Times, which hired Mandiant to investigate China-based cyber-attacks against its news operations, was the first to report on the firm’s findings. Mandiant concluded that the attacks against the newspaper had come from a different Chinese source.

In the case of the attacks described in the new report, Mandiant said it could not prove that the attacks came from within the military building it identified. But it concluded that this was the most plausible explanation for its findings. “Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one


Chinese cyber-attacks: Hello, Unit 61398 | The Economist
 
[ame=http://www.youtube.com/watch?v=JG6OLPw3O88]WFB's Bill Gertz: China has capability to attack our satellites - YouTube[/ame]
 
The Chinese have vastly improved their Rocket and missile technology...Thank you Bill Clinton... He sold us out:evil:




Clinton Approves Technology Transfer to China

By JOHN M. BRODER
Published: May 11, 1999

The Clinton Administration notified Congress today that it had approved the export of technology to China to permit the launching of a communications satellite aboard a Chinese rocket next month.

President Clinton said in a letter to Congress that the transfer would not harm national security or significantly improve China's military capability in space. The President was required under a 1998 law to certify that all such technology exports are in the national interest.

The certification was the first such notice to Congress under the law, which was passed in the aftermath of a Congressional uproar last year over the transfer of sensitive missile technology to China.

Mr. Clinton's notification also follows by less than a week the release of a report by the Senate Select Committee on Intelligence, which concluded that lax monitoring of the launching of American-made satellites aboard Chinese rockets had enhanced the accuracy of China's ballistic missile arsenal.

Clinton Approves Technology Transfer to China - NYTimes.com
 

Forum List

Back
Top