Connect with us

Headlines

Oxonian Vet on Chinese Gathering of Information and the Implications

Published

on

Captain Joe Skinner

Captain Joe Skinner

This is the second article of a three part series on China. In the first article I discussed the self-inflicted policy of the U.S. that benefits China. This article will discuss how China gathers information, how it uses the internet, and the implications for the United States and the world.

As I stated in an earlier article, the Director of the FBI, reported: “There are two kinds of big companies in the United States. There are those who’ve been hacked by the Chinese and there are those who don’t know they’ve been hacked by the Chinese.” China has a chip on their shoulder and actively pursues illegal activities to improve their national standing. This behavior is sanctioned by the communist party and tacitly condoned by the unaware or supported by gullible panda huggers.

An FBI Counter-Intelligence analyst, Paul Moore, used the following analogy for the Chinese: “If a beach was an espionage target, the Russians would send in a sub, frogmen would steal ashore in the dark of night and with great secrecy collect several buckets of sand and take them back to Moscow. The U.S. would target the beach with satellites and produce reams of data. The Chinese would send in a thousand tourists, each assigned to collect a single grain of sand. When they returned, they would be asked to shake out their towels. And they would end up knowing more about the sand than anyone else.”

For decades the Chinese have been stealing small pieces of information about science, technology, and manufacturing from around the world. They are using this information to bypass the expensive research and development to produce new products at costs that undercut companies that develop new ideas. Initially this information was gained by manipulation. “In the manipulation of foreigners every Chinese from amah and houseboy to the Generalissimo (Chiang Kai-shek(CKS)) and Madame (CKS’s wife) consider himself expert. In this matter Chinese confidence in themselves was supreme and their skills unsurpassed. They were adept, unrelenting, smooth and more often than not successful.“ (Barbara W. Tuchman “Stilwell and the American Experience in China, 1911-45”, page 332.)

Today, using manipulation, the Chinese gathers information in U.S. universities, businesses, think-tanks, and the U.S. government. People are willing to share information because they feel they owe Chinese hosts for their extreme hospitality, feel sorry for the poverty in China, believe in information without borders, or are panda huggers that want to help this ancient and proud culture. This information transfer that was once a trickle is becoming a flood as China exploits internet access and hacking into U.S. businesses, government, and all segments of society to obtain personal and sensitive data.

Additionally, China can use the internet to disrupt every facet of life in America. Keith B. Alexander, the National Security Agency Chief, while testifying before a congressional panel, stated that China could launch cyber attacks against U.S. infrastructure, including power, water, and aviation systems. Without power, street lights are out, gas stations are inoperable, cell phones are disabled, the internet is off, and transportation and communications return to the 1800s. Without water, cooking and basic sanitation requirements are impossible in cities.

In conclusion it is imperative to understand China is a competitor that will use every tool available to exploit America and even the smallest piece of information contributes to their efforts to regain the position of “Middle Kingdom.”


Captain Joe Skinner served 38 years in the Dept. of Defense, 31 years as a Naval Officer. He spent the last 13 years of his defense career working on China/Taiwan related issues. He is considered a Taiwan military expert and a China hand. He is now retired and calls Oxford his home. This is his take on U.S. and China’s international relations

Ole Miss Men’s Basketball

Mon, Nov 4Long Island University Logovs Long Island University W, 90-60
Fri, Nov 8Grambling Logovs GramblingW, 66-64
Tue, Nov 12South Alabama Logovs South AlabamaW, 64-54
Sat, Nov 16Colorado State Logovs Colorado StateW, 84-69
Thu, Nov 21Oral Roberts Logovs Oral RobertsL, 100-68
Thu, Nov 28BYU Logovs BYUW, 96-85 OT
Fri, Nov 29Purdue Logovs 13 PurdueL, 80-78
Tue, Dec 3Louisville Logo@ LouisvilleW, 86-63
Sat, Dec 7Lindenwood Logovs LindenwoodW, 86-53
Sat, Dec 14Georgia Logovs Southern MissW, 77-46
Tue, Dec 17Southern Logovs SouthernW, 74-61
Sat, Dec 21Queens University Logovs Queens UniversityW, 80-62
Sat, Dec 28Memphis Logo@ MemphisL, 87-70
Sat, Jan 4Georgia Logovs GeorgiaW, 63-51
Wed, Jan 8Arkansas Logo@ 23 ArkansasW, 73-66
Sat, Jan 11LSU Logovs LSUW, 77-65
Tue, Jan 14Alabama Logo@ 5 AlabamaW, 74-64
Sat, Jan 18Mississippi State Logo@ 17 Mississippi StateL, 81-84
Wed, Jan 22Texas A&M State Logovs 13 Texas A&ML, 62-63
Sat, Jan 25Missouri Logo@ Missouri5:00 PM
SECN
Wed, Jan 29Texas Logovs Texas8:00 PM
ESPN2
Sat, Feb 1Auburn Logovs 2 Auburn3:00 PM
TBA
Tue, Feb 4Kentucky Logovs 10 Kentucky6:00 PM
ESPN
Sat, Feb 8LSU Logo@ LSU7:30 PM
SECN
Wed, Feb 12South Carolina Logo@ South Carolina6:00 PM
SECN
Sat, Feb 15Mississippi State Logovs 17 Mississippi State5:00 PM
TBA
Sat, Feb 22Auburn Logo@ Vanderbilt2:30 PM
SECN
Wed, Feb 26Auburn Logo@ 2 Auburn6:00 PM
TBA
Sat, Mar 1Oklahoma Logovs 12 Oklahoma1:00 PM
TBA
Wed, Mar 5Tennessee Logovs 1 Tennessee8:00 PM
TBA
Sat, Mar 8Florida Logo@ 6 Florida5:00 PM
SECN

@ COPYRIGHT 2024 BY HT MEDIA LLC. ALL RIGHTS RESERVED. HOTTYTODDY.COM IS AN INDEPENT DIGITAL ENTITY NOT AFFILIATED WITH THE UNIVERSITY OF MISSISSIPPI.