Wanted by the U.S.

By From page A4 | May 26, 2014

It may seem like spitting in the wind, but we’ll give credit to Attorney General Eric Holder, obviously with the support of President Obama, for exposing the Chinese cyber thieves.

Part of a military unit, the pictures published Tuesday show at least two of them in uniform.

With names like Wang Dong aka Ugly Gorilla, Jack Sun, WinXYHappy, Huang Zhenyu and KandyGoo, this is obviously the tip of the iceberg of this den of government thieves.

The computer hackers stole industrial secrets from U.S. Steel, Alcoa, even the Steel Workers Union, Westinghouse, SolarWorld and Allegheny Technologies. They have also stolen from defense contractors.

The Chinese Ministry obviously pooh-poohed the allegations, denied them outright and demanded they be withdrawn. All this did was prove the Chinese communist government is officially a lying sack of Panda poop.

In these times it is expected governments will spy on each other and try to figure out what each other’s military is planning. What we don’t expect is that a foreign government will steal industrial secrets.

Distrust permeates this communist government and its increasingly belligerent army. The Chinese are trying to take over the entire South China Sea, including ocean within the territorial limits of the Philippines and Vietnam. They are also claiming control of the air space above the South China Sea.

The Chinese have built 3,000 miles of underground tunnels. U.S. analysts refer to them as the underground “Great Wall.” Private analysts estimate 3,000 nuclear weapons are stored in the Chinese army’s tunnels. U.S. Defense officials estimate 300 weapons.

This discrepancy led President Obama in January to sign Congress’ Defense Authorization Act that ordered the Strategic Command to submit a report by August on the Chinese tunnels and whether they can be neutralized by nuclear or conventional weapons.

A Georgetown University team led by Professor Phillip Karber, a former Defense Department strategist, conducted a three-year study to analyse and map out China’s tunnel system.

Three thousand miles? They could put their whole army in those tunnels. The real tactic is to figure out how to put a cork in the tunnel entrances once the army’s inside, to create another buried army like the terracotta army of third century BC emperor Qin Shi Huang.

In the meantime, we hope our government can figure out how to disable the computers of those communist army hackers.

Mountain Democrat

  • Recent Posts

  • Enter your email address to subscribe and receive notifications of new posts by email.

  • Special Publications »

    Use of this site constitutes acceptance of our Terms of Service (updated 4/30/2015) and Privacy Policy (updated 4/7/2015).
    Copyright (c) 2016 McNaughton Newspapers, Inc., a family-owned local media company that proudly publishes the Daily Republic, Mountain Democrat, Davis Enterprise, Village Life and other community-driven publications.