Are we secretly at war with China?

Imagine this. You have a neighbor that provides a toy for your child but it is coated in lead. He sells you a mobile home made from toxic construction materials. He offers you tainted food. He owns a lot of your neighborhood—so he can dictate local policies. He has stolen scores of intellectual property from your business, including product blueprints, manufacturing plans, clinical trial results, pricing documents, negotiation strategies and other proprietary information. He then competes against you—using your own information and product. You confront him. He denies any wrongdoing. How long would you put up with this malfeasance?
No doubt your tolerance wouldn’t be as long as that shown by the Obama administration toward China, which has poked the U.S. in the eyes on every one of these issues. Computer industry security experts have documented that China has stolen data from companies here and from the United States government with hardly a burp of protest from Washington. Indeed, hackers for a cyber-unit of China’s People Liberation Army are in full attack mode again after being outed just a few months ago. Analysts have proof that this unit hacked into Coca Cola—not for the soda’s formula but for information about its plans to acquire a company base in China. Lockheed Martin, the aerospace contractor, had its brain picked clean. Power grids in this country and Canada have been scoured, and detailed blueprints of half the oil and gas pipelines in North America have been purloined by the Chinese.
So, it is very strange that President Obama cancels a confab with Vladimir Putin of Russia over the temporary asylum given to Mr. Snowden, who leaked government secrets, while he tolerates the wholesale looting of intellectual property by China. It’s one thing to be lathered up about piracy of movies and music; it’s quite another to have defense information and infrastructure grids hacked. This raises the question, of course, of why China is fixated on defense information and  electric grid and computer satellite information? Is this a new type of war where a country defeats an enemy without stepping foot on its soil? Is this the new beachhead?
It’s hard to understand the sanguine response of the United States. In turn, this lassitude lulls the public into thinking that everything is copasetic. I, for one, think that China is robbing us blind and is endangering the health of the population with this very successful guerilla attack on us. If you were to link all the opprobrious activities of China from its exportation here of products that kill, to its data access, to security and satellite information, one would see a much more malign pattern.
To raise such an issue of intrusion invites criticism of paranoia. Big business remains muted in its criticism because of its lust for the billions of “consumers’ in China’s marketplace. This benign neglect of China’s stealth policies might one day result in a change of everyone’s citizenship if these activities continue unabated. Who is looking out for this country’s interest? Certainly, not the politicians in Congress and the White House.

Authors

Related posts

One Comment;

  1. Raymond Andrews said:

    You want to be upset with China, go right ahead, but please do some research into the subject rather than adopting the simplistic “It’s Obama’s Fault” mantra.

    The espionage from China went into high gear following the Tiananmen Square incident in 1989 under George H.W. Bush but little of it was disclosed until the very end of his term and into the beginning of Clinton’s term.

    Under Clinton spying continued with multiple spies being caught working in Silicon Valley companies, while at the same time many trade restriction were being lifted.

    Under George W Bush, China’s attempts at getting us information became even more pronounced up to and including the downing and stripping down of the EP3 spy plane along with the temporary imprisonment of its crew in 2001. Coincidently during the second Bush’s term trade restrictions were lowered even more as were regulations governing the inspection of imported goods. It’s during Bush’s second term that we started to see mass importation of tainted and counterfeit goods as well as the “outsourcing” trend which shipped millions of manufacturing jobs to China.

    During Obama’s presidency, we’ve seen some continued importation of counterfeit goods, a drop-off in tainted goods, and continued attempts at electronic espionage. The hacking attempts have gone up during this time, but mainly because effective tools to both attempt the hacking as well as detect it haven’t been around all that long.

    You want to dislike China, go right ahead, they do a lot of underhanded and illegal things, but do so because of what China is doing not just because you dislike the current administration.

Top