- D.C. elections board gives green light to marijuana legalization initiative
- Elephants can tell difference between human languages: study
- Libyan prime minister ousted by parliament
- Men’s Wearhouse to buy Jos A Bank for $1.8B
- Boston bomb squad destroys unattended pressure cooker: report
- Colorado rakes in $2 million from January’s marijuana sales
- House Democrats trying to force unemployment insurance vote
- Sen. Claire McCaskill to tackle sex assault at college next
- Judge’s order preserves NSA surveillance records
- Refurbished Pollock masterpiece goes on display
Inside the Ring
“I’m a firm believer in dialogue,” said Air ForceGen. Kevin P. Chilton, who said he learned the value of military exchanges after working on the Pentagon’s Joint Staff immediately after the Sept. 11 attacks.
Gen. Chilton, who steps down Friday as Stratcom commander, said he was ordered at the time to quickly develop ties with Pakistan's military, only to find that relations had been frozen for years over U.S. nuclear concerns. He was tasked with getting Pakistani military support for U.S. military basing and overflights for the October 2001 operation against al Qaeda in Afghanistan.
“I learned a very important lesson there and something that marked me for life: It’s best to have open dialogue,” he said. “It helps with transparency; if nothing else, you know who to call in crisis, or impending crisis or times of uncertainty. Many, many times it can lead to an opportunity to diffuse a crisis or inform your leadership on how things might progress.”
Defense Secretary Robert M. Gates earlier this month visited China and asked Beijing to join “strategic talks” on the four areas. China’s defense minister was lukewarm to the idea, promising only to “study” the talks proposal.
He quoted Chinese Col. Yao Yunzhu, who took part in a 2009 meeting on deterrence, as telling the conference: “We [the Chinese military] don’t like being transparent, quite frankly, at this point. We don’t see it to our advantage.”
Earlier Chinese spying involved obtaining secrets on every deployed weapon in the U.S. nuclear arsenal during the 1990s, a case that was never formally resolved by the FBI — that of Los Angeles defense contractor Chi Mak, which compromised Navy technology.
Ken Sorensen, assistant U.S. attorney in Hawaii who prosecuted the case, told Inside the Ring that Gowadia’s 32-year prison term “sends a clear message that the compromise of U.S. classified information involving our most sensitive weapons systems will not only be aggressively pursued by the government, but will be dealt with severely by our court system.”
“The evidence in the case demonstrated that Gowadia, one of the original designers of the B-2 bomber, was first taken by the Chinese to Chengdu, the same location where they just unveiled the J-20 earlier this month,” Mr. Sorenson said, referring to China’s version of the stealth fighter jet.
“Gowadia made six trips to China from August 2003 to October 2005 for the purpose of designing a cruise missile with a reduced infrared signature,” he said.
Mr. Sorenson said evidence showed that by October 2005 the Chinese were at least in the last stage of full-scale testing on Gowadia’s stealthy cruise-missile design.
“Cruise missiles can deliver nuclear or conventional payloads, so they are formidable weapons,” he said.
Additionally, Gowadia had disclosed to European entities his calculations of the “lock-on range” for missiles fired against the B-2 bomber.
“Suffice it to say that disclosing a scaled number of where an advanced [infrared] missile will ‘lock on’ to the B-2, arguably our nation’s most critical defense weapons system, is gravely damaging to U.S. national security,” Mr. Sorenson said.
China student spying
The spying system uses a “denounce and inform” model to control political debate, the report said, noting the system was launched after the June 1989 massacre by the Chinese military of unarmed democratic protesters in Beijing’s Tiananmen Square.
China’s students played a major role in destroying China’s culture and system during the so-called Cultural Revolution of the 1970s, when denouncing teachers and others as anti-communist enemies swept the country.
“The SIS employs traditional political spying and denunciation techniques, seeking to create a ‘white terror’ environment on campus — in which students and teachers fear surveillance more than arrest — to achieve and maintain influence and control,” according to the six-page report, labeled “FOUO” (For Official Use Only.)
The report states that such political spying has been a key tool of communist government control, especially from the 1950s to the 1970s.
“Domestic critics of the Chinese government focus more on official censorship and control of China’s new Internet-based media such as websites, online social networking tools such as Twitter, and other online resources such as bulletin board systems than on the SIS and its traditional methods,” the report says.
Most colleges and universities in China have a “student teaching information center” dedicated to student-informant-related work. Each class has a dedicated student spy who reports to the information center through e-mails, phone calls, written reports and other feedback forms.
According to the report, the spy system “soured” ties between teachers and students, with educators calling the informants “education spies.”
“Teachers reject being monitored by student informants, and worry that these students understand little about teaching methods and theories,” the report says. “Student informants worry that if they report teachers, the teachers will take their revenge and ruin the students’ academic careers.”
Some Chinese also say that promoting a “culture of denunciation” will hinder learning.
One lecturer at the Jillin Art Institute, Lu Xuesong, was suspended after a student spy reported in June 2005 that the lecturer had expressed positive views of a film about a Cultural Revolution-era dissident.
A more recent example was a student spying after the award of the Nobel Peace Prize to dissident Liu Xiaobo, when students who celebrated the award on Oct. 8 had their scholarships canceled.
“University authorities also investigated students who ‘showed unusual happiness’ on the day of Liu’s award,” the report said. “Some students wondered how their students’ facial expression could be known by school authorities, and asked how many student informants had been hired.”
A copy of the report was obtained by Secrecy News.
The incident was described by students as “facecrime,” from the George Orwell novel “1984.”
A professor in Shanghai, Yang Shiqun, was investigated in November 2008 after two student spies denounced him as a “counterrevolutionary” because he criticized the government during his class on Chinese classics.
To resist the student spying, some Internet users in China are posting lists of student spies, prompting denunciation of them by other students.
The report says Beijing is likely to expand the spying program: “The gradual expansion of the program now under way will bring the SIS to provincial and local-level universities, colleges, and other types of schools in other regions of China.”
Saddam and terror
The latest comes from former Joint Chiefs Chairman Gen. Hugh Shelton in his new book, “Without Hesitation.”
Gen. Shelton does not hide his dislike for Mr. Rumsfeld, whose own memoir is due out in February. And he writes that he, like the President George W. Bush war Cabinet, believed Saddam still harbored weapons of mass destruction.
Perhaps that was true in regards to al Qaeda, says special correspondent Rowan Scarborough. But we now know Saddam’s regime did business with a number of terror groups. This is thanks to the work of military intelligence folks who sifted through thousands of documents seized from his intelligence apparatus after the 2003 invasion.
A captured 1993 memo to Saddam from his intelligence service, known as the Mukhabarat, said the agency was restarting efforts to help Islamic Jihad bring down the government of Egyptian President Hosni Mubarak.
“Many terrorist movements and Saddam found a common enemy in the United States,” the IDA report said. “State sponsorship of terrorism became such a routine tool of state power that Iraq developed elaborate bureaucratic processes to monitor progress and accountability.”
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Bill Gertz is a national security columnist for The Washington Times and senior editor at The Washington Free Beacon (www.freebeacon.com). He has been with The Times since 1985.
He is the author of six books, four of them national best-sellers. His latest book, “The Failure Factory,” on government bureaucracy and national security, was published in September 2008.
- Inside the Ring: Pentagon reevaluating Obama's pivot to Asia
- Inside the Ring: All eyes on Moscow's military moves in Ukraine
- Inside the Ring: China readies for 'short, sharp' war with Japan
- Inside the Ring: U.S., China in war of words over South China Sea air zone
- Inside the Ring: China military on the rails
TWT Video Picks
By David Keene
Conference showed that the values Reagan cherished still endure
- Kim Jong-un calls for execution of 33 Christians
- House Democrats trying to force unemployment insurance vote
- FCC targets black conservative in TV station fight
- White House: Cronkite dead, Galifianakis will do
- Hillary Clinton campaign received funds from Jeffrey Thompson
- Intelligence chairwoman accuses CIA of intimidation, snooping on Congress
- Obama unilaterally expands California monument land
- President Obama goes 'Between Two Ferns' to pitch Obamacare
- Made in China: Materials on U.S. F-16 jets, B-1 bombers
- Sharyl Attkisson resigns from CBS after months of talks
Pope Francis meets his 'mini-me'
Celebrity deaths in 2014
Winter storm hits states — again