-Caveat Lector-




MONDAY DECEMBER 20 1999
<http://www.worldnetdaily.com/bluesky_exnews/19991220_xex_china_spy_ma.shtml
>

WARS AND RUMORS OF WARS
China spy manual  backs Cox report
Describes techno-theft through  bribery, hacking, recruitment

© 1999 Human Events   Editor's note: Each week, in conjunction with the
hard-hitting Washington, D.C. newsweekly Human Events, WND brings you this
special report. Readers can subscribe to Human Events, at a special
discounted rate, through WorldNetDaily's online store.

The Chinese government has confirmed - in writing - that it relied on
information derived from U.S. sources to develop its nuclear weapons
technology.

When a similar conclusion was unanimously reached by the special select
committee on Chinese military technology acquisitions chaired last year by
Rep. Chris Cox, R.-Calif., it was criticized by the Clinton administration
and, more recently, by a committee of professors sponsored by Stanford
University.

A report in the Dec. 23 issue of the Far Eastern Economic Review reveals
that U.S. intelligence experts are now studying a 361-page Chinese
government publication titled, "Sources and Methods of Obtaining National
Defence Science and Technology." The book was written by Huo Zhonwen and
Wang Zongxiao, who describe themselves in the preface as teachers at
China's National Defense Science and Technology Information Center, which
is a People's Liberation Army-run school in Beijing that instructs Chinese
intelligence agents in how to gather technology intelligence wanted by the
Chinese military.

Amazingly, the book was openly published and sold in the Chinese language
in 1991 and went unnoticed by U.S. intelligence agencies for eight years.

"Analysts who have seen the book describe it as 'shocking,' and as one of
the most important intelligence documents to have emerged on China's
military espionage activities since the country launched economic reforms
in 1978," reports FEER. "It belies China's claim that it uses indigenous
research to develop military technology. It also details how China
maintains a thorough system of gathering intelligence from abroad for
military purposes, and that the U.S. is the prime focus of that effort."

The authors write that the book was put together "with the help of many
comrades at the center's liaison office" and that "one of the most
important purposes of the book" is "as a reference for those involved in
gathering national defense science and technology materials."

The authors concluded that about 80 percent of the technology intelligence
needed by the Chinese military could be found in open sources, but that 20
percent could be discovered only in classified sources.

They paid special attention to U.S. government agencies, including the
Energy Department, which overseas U.S. nuclear weapons laboratories.

"Detailed explanations are given of technical information sources in the
U.S. government," reports FEER, "including Congress, the Department of
Defense, the Department of Energy, the National Aeronautics and Space
Administration, and the National Technical Information Service. The types
of reports issued by each are listed, as well as details of the
classification levels of the reports based on their serial numbers."

"Classified materials, it says," according to FEER, "can also be obtained
through personal relationships, bribes or computer hacking. It describes
how at the time of writing, Beijing's DSTIC was setting up a database of
'famous scientists' overseas, including details of their home addresses and
'whether they have ever visited China.'"

FEER goes on to say, "The book also provides a glimpse into China's
decision in the early 1980s to abandon attempts to develop indigenous
military technologies in favor of a massive effort to obtain such
technologies from abroad."

A federal prosecutor in New Mexico last week indicted Wen Ho Lee, a
scientist at the Energy Department's Los Alamos laboratory (who had once
visited China), on charges that he had criminally mishandled some of the
nation's most sensitive nuclear secrets. Lee denies that he was a spy for
the Communist Chinese or gave secret data to anyone.

                           © 1999 WorldNetDaily.com, Inc.

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to