Tag Archives: China

About To Go Dark

We Need Our Mojo Back Vis-à-Vis China

(David P. Goldman) Bill Gertz is the dean of American defense journalists, and brings vast knowledge and an abundance of sources to his latest book. His review of China’s efforts to gain a decisive edge in military technology is indispensable reading for anyone concerned with the rapid rise of a prospective adversary. Gertz is a reporter first and foremost, and Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy distills the thinking of America’s military and intelligence establishment in a terse and highly readable presentation.

What We Don’t Know

The book’s lacunae are less the fault of the senior defense correspondent for the Washington Times and Washington Free Beacon than of the American national security establishment itself. Our institutions lack a clear understanding of what China is doing and what we should do in response. Amid the impressive mass of detail, readers are left to wonder what the Chinese really want. If they were to take over the world, what would they do with it? In the case of Nazi Germany or the Soviet Union, we know the answer, because we saw Germans and Russians at work as occupiers. China reached its present borders for the most part by 800 C.E. under the Tang Dynasty and has shown little interest in sending troops to occupy other countries.

A related question involves China’s order of battle. What does China hope to achieve with its anti-satellite weapons, carrier-killer missiles, anti-submarine devices and so forth? Gertz presents the sort of war scenario that staff officers grind out as a matter of course, without explaining what Chinese war aims might be.

A key issue is the distinction between China’s notorious theft of U.S. technology and its homegrown innovations. Not until page 185 do we read of the most striking and strategically important Chinese invention:

A major worry for American defense planners and intelligence strategists is China’s drive to deploy extremely secure quantum communications. This development was announced by China in August 2016 . . . Quantum communications for the Chinese are designed to produce encryption that is unbreakable—a capability that would hamper what has been a strategic advantage for the United States in relying on the very capable code breakers at the US National Security Agency.

Earlier in the book, Gertz had spent four pages recounting China’s theft, in 2013, of U.S. plans for the C-17 military transport plane. Reprehensible as that may be, it was not a game-changer. Quantum communications, a Chinese innovation, inaugurates a revolution in signals intelligence.

Gertz discusses Washington’s campaign to dissuade its allies from buying fifth-generation (5G) mobile broadband technology from China’s national champion Huawei Technologies. By the time the book went to press, it was evident that the initiative was a humiliating failure; not a single country on the Eurasian continent bent to American threats, which included the suspension of intelligence-sharing. Quantum communications help explain why.

About to Go Dark

Not only the Chinese, but South Korean, Japanese, British and other teams are building the capability to embed quantum communications in the new 5G networks. Not only will China go dark to U.S. signals intelligence; the rest of the world will, too, and in short order. Huawei’s 5G systems will wipe out America’s longstanding advantage in electronic eavesdropping. The U.S. intelligence community spends $80 billion a year, mostly on SIGINT, and the whole investment is at risk. Washington’s view, dutifully reported by Gertz, is that Huawei’s dominance in 5G systems will allow China to steal everyone’s data. The reality is far more ominous, as I understand it. China will enable the rest of the world to cut off America’s access to everyone else’s data. When Secretary of State Mike Pompeo urged a senior German official not to buy Huawei’s broadband, the German replied that China hadn’t eavesdropped on Chancellor Merkel’s cell-phone conversations, as had the United States.

Huawei owns 40 percent of the patents related to fifth-generation broadband, largely because it spent twice as much on research and development as its two largest rivals (Ericsson and Nokia) combined. The strategic challenge to the United States comes not from Chinese technology theft, obnoxious as that is, but from Chinese innovation backed by state resources. The American intelligence community realized too late that China had gained the upper hand, and convinced the Trump administration to try to postpone the 5G rollout until it could work out what to do next. The failure is of such catastrophic proportions that no one in a position of responsibility dare acknowledge it for fear of taking the blame.

Domination of E-Commerce and E-Finance

Huawei’s vision of a global broadband market under its domination is hardly a secret. This is a case where China has advertised its intentions while the US ignored the issue. Since 2011, the company’s website has promulgated an “eco-system” enabled by broadband networks that in turn would bring in Chinese e-commerce, e-finance, logistics, and marketing—in short, the whole array of business and financial services that will integrate the labor of billions of people into the greater Chinese model.

The world will become a Chinese company store: Chinese banks will lend the money, Huawei will build the broadband network and sell the handsets, Alibaba and JD.Com will market the products, Ant Financial will make micro-loans, and Chinese companies will build airports and railroads and ports. As an investment banker for a Hong Kong boutique from 2013 to 2016, I saw this first hand, and reported it here. Among other things, Huawei is building most of Mexico’s new national broadband network, including 5G capability, in a consortium with Nokia financed by a group led by Morgan Stanley and the International Finance Corporation. Huawei also dominates telecommunications infrastructure in Brazil and other Latin American countries. China’s tech dominance in America’s neighborhood, remarkably, has occasioned no official comment from Washington.

In my view, this is far more alarming than what Gertz envisions. He writes, “China will control all deals and win any business arrangements it seeks by dominating the information domain and thus learning the positions of bidders and buyers. All Chinese companies will be given advantages in the marketplace.”

That simply isn’t the way things work. China will lock whole countries into Chinese hardware through state-financed national broadband networks, including Brazil and Mexico, where construction is underway. It understands the network effect that made Amazon and Facebook dominant players in the U.S. market, and will use its financial and technological head start to establish the same sort of virtual monopoly for Chinese companies throughout the Global South.

China envisions a virtual empire, with military deployments to protect key trade routes, starting with oil from the Persian Gulf. China’s navy established its first overseas base in Djibouti last year. Meanwhile China has invested heavily in high-tech weaponry, including satellite killers. During the first minutes of war, the United States and China would destroy each other’s communications and reconnaissance satellites. But China has a network of thousands of high-altitude balloons around its coasts, too many for U.S. forces to destroy.

Why a Shooting War Is Unlikely

The dog that doesn’t bark in this particular night is China’s land army. China has about 40,000 marines and an additional 60,000 seaborne mechanized infantry, enough to invade Taiwan. Otherwise its ground forces are feeble. China spends about $1,500 to arm an infantryman, as compared to $17,500 for his American counterpart. China owns no ground-attack aircraft like the American A-10 or the Russian SU-25. Unlike the United States, China hasn’t equipped its forces for any foreign expeditions, excepting of course the threat against Taiwan. With few exceptions its military priority is control of its own coastline. That in my view is why a shooting war is not likely. America cannot win a war on China’s coast, and China has scant interest in fighting anywhere else.

As we examine the details, the picture of a Soviet-style communist regime bent on world domination falls apart. China’s concept of world domination is so different from what we imagine that it has halfway come to fruition before we noticed it. The broader issues are too complex to address in a review, but I feel obliged to add that there is quite a different way of looking at present-day China, as an imperial system with a 3,000 year history.

In extensive contacts with Chinese officials, I haven’t met a single dedicated communist, except for the distinguished professor of Marxist-Leninist studies who asked me to help his child find a job on Wall Street. I do not believe in Gertz’s distinction between the good Chinese people and the wicked communist leaders. The emperor (the leader selected by the Mandarin caste that today masquerades as communists) is the capo di tutti capi, whose job is to limit the depredations of local power centers and maintain order. Most mainlanders will tell you blandly that, without an emperor they would kill each other, as they indeed have done after the fall of every Chinese dynasty.

No one should minimize the brutality of the present dynasty by any means; but it is no more reprehensible than the Ming, who buried a million forced laborers in the Great Wall, or the Qin, who destroyed the whole literary record of the Chinese kingdoms that preceded it and buried alive hundreds of scholars to ensure that no memory of the past survived. Every Chinese in a position of influence, when asked about the Muslim Uyghur minority in China’s far West, will say matter-of-factly, “We’re going to kill them all.” China has been exterminating “unruly barbarians” on its borders for thousands of years. That is why the Huns came to Europe and the Turks came to Asia Minor: Chinese punitive expeditions against these peoples forced them to migrate westward.

In China’s view, the “Century of Humiliation” that lasted from the First Opium War of 1848 to the Communist Revolution of 1949 was a temporary aberration that displaced China from its dominant position in the world economy, a position the present dynasty seeks to restore. If we do not want this to happen, we will have to dominate critical technologies, including quantum computing, quantum communications, broadband, Artificial Intelligence, and missile defense.

Weak Proposals

The recommendations that Gertz offers at the book’s conclusion do not convince me. He proposes to disengage economically from China; I should think that our object should be to introduce innovations that disrupt and discredit China’s state planning. We have none at the moment, but that is because American high-tech industry has invested overwhelmingly in software and left the manufacturing to Asia. We require a revival of American R&D on the scale of our response to Sputnik. Gertz also proposes “covert financial warfare” to disrupt China’s overseas borrowing. He does not seem to realize that China is a net creditor to the extent of $1.6 trillion, which means that it can finance its own requirements readily. He wants to crack down on Chinese nationals abusing their position in the United States, and so forth.

None of this will make a difference. Our problem is far graver. China now graduates four STEM bachelor’s degrees to every one of ours, and the ratio is rising. Foreign students earn four-fifths of all doctoral degrees in electrical engineering and computer science at U.S. universities. Because we have so few engineering students (just 5 percent of undergraduate majors), engineering faculties are small, which means that most of the foreign students return to teach in their own countries. The United States has trained a world-class engineering faculty at Chinese universities, such that the best Chinese students stay home. I know Chinese IT managers who will not hire Chinese students with a U.S. bachelor’s degree, because the Chinese programs are more rigorous.

We can only best China through innovation, and we are losing our edge in that regard. Nothing short of a grand national effort on the scale of the Kennedy moonshot or the Reagan Cold War defense buildup will get our mojo back.

Source: by David P. Goldman | Law & Liberty

Advertisements

The Chinese Threat Is Existential

https://westernrifleshooters.files.wordpress.com/2018/08/2fujsj.jpg

Woolsey, former CIA director in the administration of Bill Clinton, said China is seeking to defeat the United States according to the dictums of the ancient Chinese strategist Sun Tzu—without having to engage in a major conflict.

Continue reading

China’s Mass Surveillance App Hacked; Code Reveals Specific Criteria For Illegal Oppression

Human Rights Watch got their hands on an app used by Chinese authorities in the western Xinjiang region to surveil, track and categorize the entire local population – particularly the 13 million or so Turkic Muslims subject to heightened scrutiny, of which around one million are thought to live in cultural ‘re-education’ camps

https://www.zerohedge.com/s3/files/inline-images/china%20uyghur-detainees1_0.jpg?itok=tDgTAr-t

By “reverse engineering” the code in the “Integrated Joint Operations Platform” (IJOP) app, HRW was able to identify the exact criteria authorities rely on to ‘maintain social order.’ Of note, IJOP is “central to a larger ecosystem of social monitoring and control in the region,” and similar to systems being deployed throughout the entire country. 

The platform targets 36 types of people for data collection, from those who have “collected money or materials for mosques with enthusiasm,” to people who stop using smartphones. 

[A]uthorities are collecting massive amounts of personal information—from the color of a person’s car to their height down to the precise centimeter—and feeding it into the IJOP central system, linking that data to the person’s national identification card number. Our analysis also shows that Xinjiang authorities consider many forms of lawful, everyday, non-violent behavior—such as “not socializing with neighbors, often avoiding using the front door”—as suspicious. The app also labels the use of 51 network tools as suspicious, including many Virtual Private Networks (VPNs) and encrypted communication tools, such as WhatsApp and Viber. –Human Rights Watch

https://www.zerohedge.com/s3/files/inline-images/hrw%20look%20for.jpg?itok=H4u3swit(full size image)

Another method of tracking is the “Four Associations”

The IJOP app suggests Xinjiang authorities track people’s personal relationships and consider broad categories of relationship problematic. One category of problematic relationships is called “Four Associations” (四关联), which the source code suggests refers to people who are “linked to the clues of cases” (关联案件线索), people “linked to those on the run” (关联在逃人员), people “linked to those abroad” (关联境外人员), and people “linked to those who are being especially watched” (关联关注人员). –HRW

*An extremely detailed look at the data collected and how the app works can be found in the actual report.

https://www.zerohedge.com/s3/files/inline-images/chinese%20cops_0.jpg?itok=hR9nuBo2

HRW notes that “Many—perhaps all—of the mass surveillance practices described in this report appear to be contrary to Chinese law, and also violate internationally guaranteed rights to privacy, the presumption of innocence, and freedom of association and movement. “Their impact on other rights, such as freedom of expression and religion, is profound,” according to the report. 

Here’s what happens when ‘irregularities’ are detected:

When IJOP detects a deviation from normal parameters, such as when a person uses a phone not registered to them, or when they use more electricity than what would be considered “normal,” or when they travel to an unauthorized area without police permission, the system flags them as “micro-clues” which authorities use to gauge the level of suspicion a citizen should fall under. 

https://www.zerohedge.com/s3/files/inline-images/check%20point.jpg?itok=YeGm8y95

A checkpoint in Turpan, Xinjiang equiped with machines that verify ID, facial recognition and retrieve data from personal electronic divices for analysis.

IJOP also monitors personal relationships – some of which are deemed inherently suspicious, such as relatives who have obtained new phone numbers or who maintain foreign links. 

Chinese authorities justify the surveillance as a means to fight terrorism. To that end, IJOP checks for terrorist content and “violent audio-viusual content” when surveilling phones and software. It also flags “adherents of Wahhabism,” the ultra-conservative form of Islam accused of being a “source of global terrorism.

A former Xinjiang resident told Human Rights Watch a week after he was released from arbitrary detention: “I was entering a mall, and an orange alarm went off.” The police came and took him to a police station. “I said to them, ‘I was in a detention center and you guys released me because I was innocent.’… The police told me, ‘Just don’t go to any public places.’… I said, ‘What do I do now? Just stay home?’ He said, ‘Yes, that’s better than this, right?’” –Human Rights Watch

The IJOP system was developed by a major-state owned military contractor – the China Electronics Technology Group Corporation (CETC). The app itself was developed by Hebei Far East Communication System Engineering Company (HBFEC), a company that, at the time of the app’s development, was fully owned by CETC. 

https://www.zerohedge.com/s3/files/inline-images/Chinese%20muslim%20scanner.jpg?itok=MkGNt7Jr

3D portrait and integrated data capturing passage.

Meanwhile, under the broader “Strike Hard Campaign, authorities in Xinjiang are also collecting “biometrics, including DNA samples, fingerprints, iris scans, and blood types of all residents in the region ages 12 to 65,” according to the report, which adds that “the authorities require residents to give voice samples when they apply for passports.

The Strike Hard Campaign has shown complete disregard for the rights of Turkic Muslims to be presumed innocent until proven guilty. In Xinjiang, authorities have created a system that considers individuals suspicious based on broad and dubious criteria, and then generates lists of people to be evaluated by officials for detention. Official documents state that individuals “who ought to be taken, should be taken,” suggesting the goal is to maximize the number of people they find “untrustworthy” in detention. Such people are then subjected to police interrogation without basic procedural protections. They have no right to legal counsel, and some are subjected to torture and mistreatment, for which they have no effective redress, as we have documented in our September 2018 report. The result is Chinese authorities, bolstered by technology, arbitrarily and indefinitely detaining Turkic Muslims in Xinjiang en masse for actions and behavior that are not crimes under Chinese law.

Read the entire report from Human Rights Watch here.

https://hcsblogdotorg.files.wordpress.com/2019/05/zip.jpg

Source: ZeroHedge

 

Actually, We Probably Shouldn’t Let China Spy On Us

 

Bloomberg News came out of left field on April 20, with the headline “We Should Let China Spy on Us.” The main points are fair: Close to 80 percent of the CIA’s intelligence allegedly comes from open source information, and information from spies in the past has prevented the United States from jumping into full-scale war, such as during the Cold War.

Yet, the article misses some major points. Specifically, it doesn’t seem to grasp the activities of Chinese spy operations through things like the United Front Department and the Chinese Student and Scholar Associations and instead tries to relate these to intelligence gathering—which is a minor focus for these groups.

It also doesn’t grasp the operations of Chinese hackers involved in the surveillance and intelligence operations, which it mentions, and how these interface with Chinese spies who operate on the ground.

The basis of the article assumes that Chinese spies operate in a similar manner to U.S. spies, and focus mainly on intelligence gathering. U.S. spies look to understand how a targeted country or person operates and by grasping how it operates, to understand how, and the process it would go through, to react to key issues. Open source intelligence is very useful for information like this.

But operations like that are not what spies from the United Front Department are focused on. The focus of the United Front is ideological subversion, establishing front organizations, controlling communities of overseas Chinese people, running smuggling and criminal networks, compromising individuals, and creating alleged grassroots support for the Chinese Communist Party (CCP).

Even during the Cold War, most Soviet spies weren’t focused on the James Bond-style spy operations. They were establishing nonprofits to spread disinformation, organizing activist movements to support Soviet causes, sending “experts” to give commentary to news outlets, and compromising key people in the institutions that make the United States function.

Many spies, like those in the United Front Department, are looking to create a united “frontline” for the CCP in a targeted country — not to mention the use of sleeper agents who may be used to carry out acts of chaos or violence in the event of a war. This is fundamentally different from gentle operations like intelligence gathering done through more conventional spy operations.

The same applies to the CCP’s spy operations aimed at intellectual property theft. It’s true that most of the information is likely stolen by hacker agencies. But physical spies, operating on the ground, still play a fundamental—and very damaging—role.

The Chinese hacker group that’s most commonly known is Unit 61398, which was under the Third Department of the war fighting department of the Chinese military, the General Staff Department. The CCP has since restructured its military, but when Unit 61398 was exposed, it was just one of 22 known operational bureaus. This was before the CCP reorganized these operations under its Strategic Support Force.

The Third Department was the signals intelligence branch, while next to it was the Second Department focused on human intelligence operations, and the Fourth Department focused on electronics intelligence operations. Other military branches were focused on other forms of unconventional operations that could include the use of spies, such as the General Political Department which was engaged in political warfare.

Yet, even the CCP’s military hackers worked closely with spies on the ground. According to a 2013 report from the CCP’s People’s Liberation Army research institute, which was outlined by the Center for Intelligence Research and Analysis, the CCP’s military hackers operated in three tiers.

The first tier, it said, was military units “employed for carrying out network attack and defense,” the second tier was civilian organizations and government offices “authorized by the military to carry out network warfare operations,” and the third tier included groups outside the government and military “that can be organized and mobilized for network warfare operations.”

Also included in the operation were front companies. A 2010 report from the U.S. Defense Threat Reduction Agency said that the CCP operated more than 3,200 military front companies in the United States dedicated to theft.

Source: by Joshua Philipp | The Epoch Times

‘Be Evil’: Google Bans VPN Ads Helping Chinese Circumvent Censorship

Google is once again helping the Chinese government and its Orwellian control over the flow of information. 

Earlier this month, evidence emerged suggesting that Google has continued to develop the “Dragonfly” censored search engine despite claiming they had abandoned it after an internal revolt.

https://www.zerohedge.com/s3/files/inline-images/dragonfly.png?itok=hLq-A0hj

Now, ZDNet reports that Google has banned ads for virtual private network (VPN) products targeting Chinese users – citing “local legal restrictions.” 

VPNs are the only way Chinese users can circumvent draconian internet filters which have blocked sites such as Facebook, Twitter, Gab, Instagram, Reddit, Discord, WhatsApp, WikiLeaks, Google and Gmail. Blocked news websites include Zero Hedge, BBC, Bloomberg, Reuters, WSJ, NYT and Business Insider. 

“It is currently Google Ads policy to disallow promoting VPN services in China, due to local legal restrictions,” Google said in a Wednesday email. 

The email was received and shared with ZDNet by VPNMentor, a website offering advice, tips, and reviews of VPN products.

The company said Google prevented its employees from placing Google search ads for the Chinese version of its site. ZDNet

https://www.zerohedge.com/s3/files/inline-images/vpn%20block.jpg?itok=MOQIbA32

In January 2017, Beijing cracked down on VPN services – requiring that all providers active in China register for authorization from the CHinese government. In July, China forced Apple to remove all VPN apps from its App Store. After that, a “full-out ban on all VPNs was imposed on March 31, 2018,” according to ZD – though some apps continued to function regardless. 

Nonetheless, Chinese officials are now using the ban to go after users caught using VPNs. The first fine for using a VPN product was issued earlier this year to a Guangdong.

Despite banning consumers from using VPN apps, China remains one of the top sellers of VPN technologies. A November 2018 study found that almost 60 percent of the top free mobile VPN apps are run by companies with Chinese ownership or based in China.

We wonder if Google employees will protest yet another example of helping China to keep its citizens in the dark?

Source: ZeroHedge

***

“Evil Is Fine Now”: Google Ditches “Don’t Be Evil” in Company Code of Conduct

https://www.commondreams.org/sites/default/files/styles/cd_large/public/headlines/google-logo-devil.jpg?itok=ELoUPwRD

Inside China’s High-Tech Dystopia Today

In part three of Hello World Shenzhen, Bloomberg Businessweek’s Ashlee Vance heads out into a city where you can’t use cash or credit cards, only your smartphone, where AI facial-recognition software instantly spots and tickets jaywalkers, and where at least one factory barely needs people. This is the society that China’s government and leading tech companies are racing to make a reality, with little time to question which advancements are net positives for the rest of us.

Part One – Inside China’s Future Factory
https://www.youtube.com/watch?v=eLmaI…

Part Two – China’s High Stakes Robot Wars
https://www.youtube.com/watch?v=qrhvZ…

https://www.bloomberg.com/hello-world

Source: Global Macro Monitor

Of Lattes & Lo Mein: The South is Headed to Another Yankee War

The growth of the power of Athens, and the alarm which this inspired in Sparta, made war inevitable.

-Thucydides, History of the Peloponnesian War

 

The world is racing toward war.  The reasons have nothing to do with trade.  This is not about cultures colliding.  This is about power, and the American South is about to be at the forefront of that struggle.

On one side there is China, an ancient empire that has reemerged over the past three decades.  It seeks to reclaim its historical domination over Pacific affairs that it held until about the early 16th century when the Asian empire went into relative obscurity and decline.  For millennia, China has occasionally found itself subservient to a long list of newcomers, only to eventually overcome them through sheer force.  The Mongols, the Japanese, the Russians, and now, the Americans.

On the other side is the United States, a modern empire that has dominated global affairs for a century.  Despite its ebbs and flows, American cultural dominance has been the glue that ensured its preeminence.  Americans do not conquer with tanks and bullets; they punish with tanks and bullets.  Americans conquer with Barbie dolls, McDonald’s, and media programming that sells “Americana.”

No one lives in a vacuum and that includes the South.

In fact, of any region in the world’s most dominant empire since her British for bearer, the American South should be more cognizant of global affairs than any other region, not less so.  That is because the South is America’s modern Sparta.  Of any given region, the South produces the majority of the very troops used to subjugate people around the world.  Identity Dixie has explored this topic before.  While modern Yankee boys are taught to cross their legs at Starbucks and sip soy lattes like good little genderless f—gots, Southern boys are being taught how to kill – from hunting season to hunting season, until they arrive to boot camp. 

The North produces prey who lack manners; the South produces genteel predators. 

Consequently, as the war drums begin to beat stronger between the United States and China, who do you think will be tasked with fighting that war?  The answer is almost codified in the distinctions of the regions and through general military recruitment goals.  The Southern boy, of course.

But, what are the chances of an actual war between the US and China?  Based on my vast experience and education in foreign policy, the chances are highly likely.  War is coming.

The reasons for war between the two powers are numerous. 

The seeds of our trade imbalance with China began with the former President George H. W. Bush.  He single handedly ensured that the US would eventually shift production to that massive block of unskilled, cheap laborers.  But, Bill Clinton really led the effort in 2000, with Republican Congressional support, way back when Labor Union Democrats hated the idea of outsourcing jobs to cheap manufacturers.  Of course, now Labor Union Democrats love the idea of outsourcing jobs to China, as evidenced by their animus toward Donald Trump – the only president in three decades to push back against the Communist Chinese.  Regardless, both Republicans and Democrats have eagerly surrendered economic hegemony to the Communist Chinese.  Some, like the Clintons, required extensive bribes to sell out their country.  Others did it for free.  Bush II gave China Permanent Normal Trade Relations with the US on 27 December 2001 for no discernible reason, even after they had downed a US reconnaissance aircraft earlier that same year. Evidently, no big deal.

Nearly every decision of the American Empire related to China since 1989 has served to harm the economic interests of the Southern working class, man or woman.  How about military decisions?  It is even worse.

The decisions of the Empire over the past three decades, as it pertains to Communist China, seem purposely designed to get a lot of Southern boys killed and lose a war.

First, the military aggression of the Communist Chinese has recently gotten more pronounced.  The Communists now control twenty-seven islands – some man-made – in the South and East China Seas.  They unilaterally stole islands from Vietnam and the Philippines.  These islands are now fitted with missile systems capable of destroying a US warship from as far away as Guam.  Consequently, Communist Chinese aggression denies the freedom of navigation that the American Navy and commerce has supported since Alfred Thayer Mahan and the turn of the 19th and 20th centuries.  Worse, not only did the Obama Administration sit by and watch the Chinese take over critical Asian sea lines of communication, Obama cut the ability to defend against the missiles now on the islands he watched them build.  Compounding the ability to defend against their missiles, the Chinese have known what is in our missiles for the past two decades.  Bill Clinton made that possible when he sold the technical details to the Communist Chinese in 1998.  Whereas George W. Bush seemed to take a much harder line on Communist China militarily, the relations behind the scenes depict a much friendlier approach toward Chinese military aggression

Enter Trump.

For whatever the reason, Trump did a one-hundred-eighty degree turn on American relations with China.  Unlike Obama, who called the Communists a “strategic partner” not an enemy, Trump has outright called the Chinese a threat.  To United States interests, he is correct, and Trump has taken significant steps to kill that threat. 

First, Trump attacked the underpinnings of their economy in a very successful way.  As of January 2019, the Chinese economy has dropped to its slowest growth since 1990.  Meanwhile, militarily, Trump has not only revitalized missile defense systems, he ordered the US Navy to confront the Chinese head-on in the South China Sea.  As recently as two weeks ago, analysts have predicted the threat of war between two global nuclear powers as the highest since the Cuban Missile Crisis.  The Communist Chinese have prominent military officers arguing for a war with the United States. 

Whether or not war is in American interests may be a moot point.  A strong China certainly does not serve Washington’s interests.  But what about Southern interests?

Like it or not, the US and the South are tied at the hip on this one.  There is no universe by which a Communist Chinese victory on any front – economically, diplomatically, or militarily – aids the Southern people.  The Chinese only accept nationalism when it involves their people.  Otherwise, they are the largest exporters of Communist rhetoric in the world today.  The antifa scum who target members of the Dissident Right are bought and paid for, in part, by the Communist Chinese government.

Nothing says “Anti-Facsist” like ensuring the continuation of cheap manufactured goods from labor exploiting Communist China into the United States to the detriment of the American worker.

Anyway, the Chinese purposely seek to destroy all that makes the South unique, which is a different approach than modern Russia, which views an independent South positively for different strategic reasons.  To the Chinese, boys from Texas and Tennessee constitute a very real threat to their ideological causes and are impossible to manage.  They feel the same way about Idaho and Montana, but there are simply not that many of our kin in the Rocky Mountains.  Understanding this fact, the South will have to support the American Empire in a war against China, if only to push back against a Maoist tsunami at home.

Unfortunately, like every war in the past century, that means a lot of Southern boys will fertilize the soil with their blood. A lot of Southern mothers will salt the earth with their tears. A lot of pines will be chopped down for boxes in South Georgia. All the while, Yankee men make money on commodities futures back home, sipping on lattes with their legs crossed, while their teenage son is being transformed into a drag queen and their wives are on Facebook celebrating their child’s transgenderism and diverse dating practices.

This trend will continue until the South is free.

Source: by Padraig Martin | Identity Dixie