SlideShare a Scribd company logo
Deceiving the Sky: The
Chinese Communist Threat
to American Security
Bill Gertz
Westminster Institute
October 2, 2019
U.S. Policy Toward China
• Past – conciliation and business ties
• 30-Year Gamble of Engagement -- Failed
• Trump: Economic security/national security
• Focus on Pressuring China economically
• Militarily – Slight pressure, some continuity
• Intelligence – Crackdown on econ
espionage
U.S. Policy Toward China
• NSS: China challenge:
– Against American power, influence, and
interests
– Attempting to erode American security and
prosperity
– Make economies less free and less fair
– Grow military
– Control information and data to repress their
societies and expand their influence
U.S. Policy Toward China
• NDS: China
– China is a strategic competitor using predatory
economics to intimidate its neighbors while
militarizing features in the South China Sea
– China wants to shape a world consistent with
their authoritarian model —gaining veto
authority over other nations’ economic,
diplomatic, and security decisions
U.S. Policy Toward China
• NDS: China
– China is leveraging military modernization,
influence operations, and predatory economics
to coerce neighboring countries to reorder the
Indo-Pacific region to their advantage.
– All-of-nation, long-term strategy seeking Indo-
Pacific regional hegemony in the near-term and
displacement of the United States to achieve
global preeminence in the future.
Vice President Mike Pence
VP Pence Speech
October 2018
– China using economic, diplomatic, military to
expand influence in more proactive ways
– Trump seeking new approach based on fairness,
reciprocity, respect for sovereignty
– Since1991 trade concessions under assumption
a free China was inevitable. Hope unfulfilled.
– Made in China 2025 – dominate advanced tech
– Greater repression; Expanding military
VP Pence Speech
October 2018
– Election meddling: “China wants a different
American President.”
– Propaganda and Censorship Notice: “Strike
accurately and carefully, splitting apart
different domestic groups” in US
– Senior U.S. intel official: Russian influence ops
pale in comparison to what China is doing.
Chinese Ideology
– Derived from Soviet Marxism-Leninism
– Historical China/Communist China
– Xi Jinping’s ‘China Dream’ Blends Both for
Global Supremacy
– Reality: PRC is a revolutionary communist
state engaged in ‘enemy politics’ vs. U.S.
– Extensive use of lies and deception: HK
protests
Chinese Ideology
“To sustain a communist system such as the PRC's and to
enhance internal unity under the CCP, Chinese supreme
leaders after Mao Zedong, from Deng Xiaoping and Jiang
Zemin to Hu Jintao and Xi Jinping, all diligently
campaigned to create an image of the US government as
the monstrous superpower determined to ‘contain’ China
in each and every way. Chinese supreme leaders use this
theory of a US-led capitalist conspiracy to destroy
socialist China as the most potent justification for
maintaining a draconian totalitarian social order and an
increasingly technologically sophisticated, authoritarian
and omnipotent national security state.”
--- Miles Yu, professor, U.S. Naval Academy
Xi Jinping
– Since 2012, major purge of CCP, PLA, intel
– ‘Party-ization’ of PRC Government
– Military becoming unstable
– Expansion of United Front Work
– 19th Party Congress: Assumed New Power
• Xi Jinping Thought in Constitution
• Ended term limit – Party Leader for Life
PAP police armored vehicles
dispatched from Chongqing to
Chengdu, where police surrounded
the US consulate to try and
apprehend defector Wang Lijun,
February 2012
Engagement with China
– Began with Kissinger and the ‘China Card’
– Continued under successive administrations
– Accelerated during Clinton: WTO (2001)
– Nuclear and space cooperation led to Chinese
nuclear espionage and missile improvement
– Trump initiated a major shift
– Trade war is outward sign of new new policy
A Chinese Intelligence ‘Storm’
“The Chinese intelligence storm impacting the US is
a secret assault on America that is without parallel
since that mounted by Moscow in the 1930’s and
40’s. Beijing’s ongoing intelligence campaign has
garnered no more than episodic public attention, and
then only when a spy is arrested or a high-profile
cyber-attack detected.”
--- Mark Kelton, former CIA counterintelligence
director
CIA Intelligence Disaster
– Beginning in 2010, China began arresting
recruited CIA assets
– Within in a few years, at least 27 CIA recruits
were caught by MSS
– All imprisoned or executed
– In one case, an agent was shot in a building
courtyard in front of a group of officials
– Cause: Either traitor(s) in agency or
communications compromise, or both
Chinese electronic surveillance
Headquarters, United Front Work Department, Beijing
Chinese propaganda insert in major U.S. newspapers
Zhao Qianli, MPS official arrested at Key West NAS, Sept. 2018
Ministry of Public Security headquarters, Beijing
Convicted Chinese spy and former DIA officer Ron Hansen
Convicted Chinese spy, former CIA officer Kevin Mallory
Former CIA officer Jerry Chun Shing Lee, plead guilty to spying for China
Ministry of State Security headquarters, Beijing
4PLA General Staff Department/Electronic Countermeasures and Radar Department
PLA hackers
China Cyber
• Among the most significant state cyber threats
• 20-year massive global program of cyber
espionage, cyber reconnaissance
• Ministry of State Security, 2PLA, 3PLA, Unit
61398
• Espionage, economic and traditional, and network
attack and sabotage through digital sleeper agents
• U.S. reluctant to disclose extent
China Cyber
• PRC cyber ops most secret program; Beijing
denies all
• Obama admin sought talks, norms –No results
• Trump admin using tariffs, pressure, indictments
• Industry urging more muscular response
PLA hacker Unit 61398, Shanghai
Huawei Technologies CFO Meng Wanzhou
Cyber warfare
• PLA has made cyber warfare a priority
• Use civilian hackers.
• Byzantine Hades: Massive global program of
cyber espionage. Google, RSA, Lockheed
• Cyber attacks: For espionage and future sabotage
through digital sleeper agents
• U.S. reluctant to disclose extent
• Mandiant report exposed, Pentagon report
Indictment of Chinese hackers, October 2018
Su Bin/Boeing C-17
F-22
F-35
J-20
DF-17 Hypersonic Glide Vehicle
DF-ZF hypersonic glide vehicle from Global Times
DF-41 multi-warhead ICBM
Gongji-11 (GJ-11) stealth attack drone
WZ-8 High Altitude and High Speed Reconnaissance Drone
HSU001 unmanned underwater vehicle
Long March 11 Rocket with Dong Ning ASAT Kill Vehicle
DF-26 missile
Yilong-1 Wing Loong armed UAV
Strategic Nuclear Forces
• China is engaged in a major, covert strategic
nuclear forces buildup. New missiles, warheads,
MIRVs, EMP weapons, Missile Defenses
• No engagement in talks on types, numbers,
controls.
• PRC nuclear forces built on stolen U.S. nuclear
secrets, later proliferated Pakistan, Iran, NK,
Libya.
• US Intel: 240 strategic warheads. Russia: 1,500
• Great Underground Wall
Section of 3,000-mile-long Underground Great Wall nuclear complex
CCP outlet Global Times 2013 depiction of SLMB nuclear strikes on Los Angeles
PLA electronic jammers, Mischief Reef
PLAN Type 056 corvettes, Mischief Reef
YJ-12B supersonic anti-ship missiile
HQ-9A
SAM
missile
Senkaku Islands
PLAN warships near Senkakus
Taiwan
• China’s main target. Unfinished communist
revolution
• U.S. (unofficial) ally. 1979 TRA: defensive arms,
protection from forcible reunification
• Arms sales declining. Obama refused new F-16
C/Ds. Trump approved 66 new F-16Vs
• Past détente facilitates China strategy
• Flashpoint in U.S.-China relations
Rioting in Xinjiang/East Turkistan. Over 1 million Ughurs in detention camps
Xi Jinping and Kim Jong Un, March 2018, Beijing
North Korean KN-08 ICBM carried on Chinese launcher
New U.S. Policy Toward China
• Declare PRC/CCP ‘enemy,’ disengage
• Financial warfare as in ‘80s v. Soviets
• Aggressive information operations
• Strict reciprocity
• Increased intelligence, counterintelligence
• Reform diplomatic system
New U.S. Policy Toward China
• New democratic alliance in Asia
• Restrict Chinese activities in US
• Expand regional, global missile defenses
• Counter and engage in ‘gray zone’ war
• Create Free China parliament in exile
• Play ‘Russia card’

More Related Content

What's hot

Watergate Scandal
Watergate ScandalWatergate Scandal
Watergate Scandal
AbbF183
 
Lecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power CompetitionLecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power Competition
Stanford University
 
Baptism by-fire
Baptism by-fireBaptism by-fire
Baptism by-fire
https://www.cia.gov.com
 
RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019
ChadCogan
 
Elsadek, Sara. Diplomacy research paper
Elsadek, Sara. Diplomacy research paperElsadek, Sara. Diplomacy research paper
Elsadek, Sara. Diplomacy research paper
Sara Elsadek
 
Lillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research PresentationLillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research Presentation
LillithSolomon
 
Unit #5 Terrorism Student Verision
Unit #5 Terrorism Student VerisionUnit #5 Terrorism Student Verision
Unit #5 Terrorism Student Verision
Nick Allgyer
 
National security of pakistan
National security of pakistanNational security of pakistan
National security of pakistan
Muhammad Abdul Rehman Baloch
 
North and south korea media
North and south korea mediaNorth and south korea media
North and south korea media
Andrew Kerry
 
The new aggressive china
The new aggressive chinaThe new aggressive china
The new aggressive china
TariqCarrimjee1
 
PROMISES AND PARADOXES IN KOREAN PENINSULA
PROMISES AND PARADOXES IN KOREAN PENINSULAPROMISES AND PARADOXES IN KOREAN PENINSULA
PROMISES AND PARADOXES IN KOREAN PENINSULA
Keshav Prasad Bhattarai
 
Chinese Peacekeeping in Africa
Chinese Peacekeeping in AfricaChinese Peacekeeping in Africa
Chinese Peacekeeping in Africa
George Kleuser
 
Terrorism
TerrorismTerrorism
Terrorism
Tej Surya
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
Doing What I Do
 
The gulen-movement-turkeys-islamic-supremacist-cult-and-its-contirbutions-to-...
The gulen-movement-turkeys-islamic-supremacist-cult-and-its-contirbutions-to-...The gulen-movement-turkeys-islamic-supremacist-cult-and-its-contirbutions-to-...
The gulen-movement-turkeys-islamic-supremacist-cult-and-its-contirbutions-to-...
Gulen Cemaat
 
Us foreign policy presentation
Us foreign policy presentationUs foreign policy presentation
Us foreign policy presentation
midgethompson
 
Effects of 9/11 on Pakistan
Effects of 9/11 on PakistanEffects of 9/11 on Pakistan
Effects of 9/11 on Pakistan
Areeba Aftab
 
911
911911
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
randima Dulanjani
 
CIA supporting Gulen Islamic indoctrination of children
CIA supporting Gulen Islamic indoctrination of childrenCIA supporting Gulen Islamic indoctrination of children
CIA supporting Gulen Islamic indoctrination of children
Gulen Cemaat
 

What's hot (20)

Watergate Scandal
Watergate ScandalWatergate Scandal
Watergate Scandal
 
Lecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power CompetitionLecture 1 -Technology, Innovation and Great Power Competition
Lecture 1 -Technology, Innovation and Great Power Competition
 
Baptism by-fire
Baptism by-fireBaptism by-fire
Baptism by-fire
 
RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019RMC Intelligence and Analysis Division Open Source Update - January 2019
RMC Intelligence and Analysis Division Open Source Update - January 2019
 
Elsadek, Sara. Diplomacy research paper
Elsadek, Sara. Diplomacy research paperElsadek, Sara. Diplomacy research paper
Elsadek, Sara. Diplomacy research paper
 
Lillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research PresentationLillith Solomon Undergraduate Research Presentation
Lillith Solomon Undergraduate Research Presentation
 
Unit #5 Terrorism Student Verision
Unit #5 Terrorism Student VerisionUnit #5 Terrorism Student Verision
Unit #5 Terrorism Student Verision
 
National security of pakistan
National security of pakistanNational security of pakistan
National security of pakistan
 
North and south korea media
North and south korea mediaNorth and south korea media
North and south korea media
 
The new aggressive china
The new aggressive chinaThe new aggressive china
The new aggressive china
 
PROMISES AND PARADOXES IN KOREAN PENINSULA
PROMISES AND PARADOXES IN KOREAN PENINSULAPROMISES AND PARADOXES IN KOREAN PENINSULA
PROMISES AND PARADOXES IN KOREAN PENINSULA
 
Chinese Peacekeeping in Africa
Chinese Peacekeeping in AfricaChinese Peacekeeping in Africa
Chinese Peacekeeping in Africa
 
Terrorism
TerrorismTerrorism
Terrorism
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
The gulen-movement-turkeys-islamic-supremacist-cult-and-its-contirbutions-to-...
The gulen-movement-turkeys-islamic-supremacist-cult-and-its-contirbutions-to-...The gulen-movement-turkeys-islamic-supremacist-cult-and-its-contirbutions-to-...
The gulen-movement-turkeys-islamic-supremacist-cult-and-its-contirbutions-to-...
 
Us foreign policy presentation
Us foreign policy presentationUs foreign policy presentation
Us foreign policy presentation
 
Effects of 9/11 on Pakistan
Effects of 9/11 on PakistanEffects of 9/11 on Pakistan
Effects of 9/11 on Pakistan
 
911
911911
911
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
 
CIA supporting Gulen Islamic indoctrination of children
CIA supporting Gulen Islamic indoctrination of childrenCIA supporting Gulen Islamic indoctrination of children
CIA supporting Gulen Islamic indoctrination of children
 

Similar to Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy

Lecture 2 -Technology, Innovation and Great Power Competition
Lecture 2 -Technology, Innovation and Great Power CompetitionLecture 2 -Technology, Innovation and Great Power Competition
Lecture 2 -Technology, Innovation and Great Power Competition
Stanford University
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
Murray Security Services
 
The case of the blind activist; Chen Guangcheng, a person of national interest.
The case of the blind activist; Chen Guangcheng, a person of national interest.The case of the blind activist; Chen Guangcheng, a person of national interest.
The case of the blind activist; Chen Guangcheng, a person of national interest.
Khandokar Uz Zaman
 
Richard Milhous Nixon - Shaun Hoskisson
Richard Milhous Nixon - Shaun HoskissonRichard Milhous Nixon - Shaun Hoskisson
Richard Milhous Nixon - Shaun Hoskisson
Shaun Hoskisson
 
Ap president richard nixon-ap
Ap president richard nixon-apAp president richard nixon-ap
Ap president richard nixon-ap
arleneinbaytown
 
Latin America-China relations.pdf
Latin America-China relations.pdfLatin America-China relations.pdf
Latin America-China relations.pdf
University of West Indies
 
Ap president richard nixon-ap
Ap president richard nixon-apAp president richard nixon-ap
Ap president richard nixon-ap
Arlene Hastings-Hill
 
China's Buzzwords and Hot-Topics: A Post-2015 "Two Sessions" Analysis
China's Buzzwords and Hot-Topics: A Post-2015 "Two Sessions" AnalysisChina's Buzzwords and Hot-Topics: A Post-2015 "Two Sessions" Analysis
China's Buzzwords and Hot-Topics: A Post-2015 "Two Sessions" Analysis
Allegravita
 
X47 pak
X47 pakX47 pak
X47 pak
Adrian Otap
 
Cyberwar
CyberwarCyberwar
China & Obama
China & ObamaChina & Obama
China & Obama
Don Menzel
 
Goal 12 phillips
Goal 12 phillipsGoal 12 phillips
Goal 12 phillips
Dave Phillips
 
Terrorism And International Ramifications,
Terrorism And International Ramifications,Terrorism And International Ramifications,
Terrorism And International Ramifications,
Enterprise Security Risk Management
 
Week 6 day four cold war
Week 6 day four cold warWeek 6 day four cold war
Week 6 day four cold war
krobinette
 
UNPRESIDENTED: A World View of the US Election 2016
UNPRESIDENTED: A World View of the US Election 2016UNPRESIDENTED: A World View of the US Election 2016
UNPRESIDENTED: A World View of the US Election 2016
Rosalind Warner
 
Trump on-china-putting-america-first
Trump on-china-putting-america-firstTrump on-china-putting-america-first
Trump on-china-putting-america-first
中 央社
 
Public Lecture Slides (7.9.2018) Sino-Japanese Power Politics
Public Lecture Slides (7.9.2018) Sino-Japanese Power PoliticsPublic Lecture Slides (7.9.2018) Sino-Japanese Power Politics
Public Lecture Slides (7.9.2018) Sino-Japanese Power Politics
Institute of Contemporary Asian Studies (ICAS) at TUJ
 
H0365061066
H0365061066H0365061066
H0365061066
theijes
 
The US Foreign Policy.pptx
The US Foreign Policy.pptxThe US Foreign Policy.pptx
The US Foreign Policy.pptx
mubasherakram1
 
Teacher Notes MODULE 28.pptx
Teacher Notes MODULE 28.pptxTeacher Notes MODULE 28.pptx
Teacher Notes MODULE 28.pptx
International advisers
 

Similar to Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (20)

Lecture 2 -Technology, Innovation and Great Power Competition
Lecture 2 -Technology, Innovation and Great Power CompetitionLecture 2 -Technology, Innovation and Great Power Competition
Lecture 2 -Technology, Innovation and Great Power Competition
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
The case of the blind activist; Chen Guangcheng, a person of national interest.
The case of the blind activist; Chen Guangcheng, a person of national interest.The case of the blind activist; Chen Guangcheng, a person of national interest.
The case of the blind activist; Chen Guangcheng, a person of national interest.
 
Richard Milhous Nixon - Shaun Hoskisson
Richard Milhous Nixon - Shaun HoskissonRichard Milhous Nixon - Shaun Hoskisson
Richard Milhous Nixon - Shaun Hoskisson
 
Ap president richard nixon-ap
Ap president richard nixon-apAp president richard nixon-ap
Ap president richard nixon-ap
 
Latin America-China relations.pdf
Latin America-China relations.pdfLatin America-China relations.pdf
Latin America-China relations.pdf
 
Ap president richard nixon-ap
Ap president richard nixon-apAp president richard nixon-ap
Ap president richard nixon-ap
 
China's Buzzwords and Hot-Topics: A Post-2015 "Two Sessions" Analysis
China's Buzzwords and Hot-Topics: A Post-2015 "Two Sessions" AnalysisChina's Buzzwords and Hot-Topics: A Post-2015 "Two Sessions" Analysis
China's Buzzwords and Hot-Topics: A Post-2015 "Two Sessions" Analysis
 
X47 pak
X47 pakX47 pak
X47 pak
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
China & Obama
China & ObamaChina & Obama
China & Obama
 
Goal 12 phillips
Goal 12 phillipsGoal 12 phillips
Goal 12 phillips
 
Terrorism And International Ramifications,
Terrorism And International Ramifications,Terrorism And International Ramifications,
Terrorism And International Ramifications,
 
Week 6 day four cold war
Week 6 day four cold warWeek 6 day four cold war
Week 6 day four cold war
 
UNPRESIDENTED: A World View of the US Election 2016
UNPRESIDENTED: A World View of the US Election 2016UNPRESIDENTED: A World View of the US Election 2016
UNPRESIDENTED: A World View of the US Election 2016
 
Trump on-china-putting-america-first
Trump on-china-putting-america-firstTrump on-china-putting-america-first
Trump on-china-putting-america-first
 
Public Lecture Slides (7.9.2018) Sino-Japanese Power Politics
Public Lecture Slides (7.9.2018) Sino-Japanese Power PoliticsPublic Lecture Slides (7.9.2018) Sino-Japanese Power Politics
Public Lecture Slides (7.9.2018) Sino-Japanese Power Politics
 
H0365061066
H0365061066H0365061066
H0365061066
 
The US Foreign Policy.pptx
The US Foreign Policy.pptxThe US Foreign Policy.pptx
The US Foreign Policy.pptx
 
Teacher Notes MODULE 28.pptx
Teacher Notes MODULE 28.pptxTeacher Notes MODULE 28.pptx
Teacher Notes MODULE 28.pptx
 

More from Westminster Institute

Dean Cheng: How China Sees the World
Dean Cheng: How China Sees the WorldDean Cheng: How China Sees the World
Dean Cheng: How China Sees the World
Westminster Institute
 
The Nature of Putin’s Regime and the Reasons for its Foreign Policy
The Nature of Putin’s Regime and the Reasons for its Foreign PolicyThe Nature of Putin’s Regime and the Reasons for its Foreign Policy
The Nature of Putin’s Regime and the Reasons for its Foreign Policy
Westminster Institute
 
Harun Maruf: Al Shabaab Update and Strategic Plan
Harun Maruf: Al Shabaab Update and Strategic PlanHarun Maruf: Al Shabaab Update and Strategic Plan
Harun Maruf: Al Shabaab Update and Strategic Plan
Westminster Institute
 
Dr. Patrick M. Cronin: Total Competition: The China Challenge in the South
Dr. Patrick M. Cronin: Total Competition: The China Challenge in the SouthDr. Patrick M. Cronin: Total Competition: The China Challenge in the South
Dr. Patrick M. Cronin: Total Competition: The China Challenge in the South
Westminster Institute
 
Paul Marshall: Indonesia's Muslim Counter Radicalization Movements
Paul Marshall: Indonesia's Muslim Counter Radicalization MovementsPaul Marshall: Indonesia's Muslim Counter Radicalization Movements
Paul Marshall: Indonesia's Muslim Counter Radicalization Movements
Westminster Institute
 
David Des Roches: The Ongoing War in the Persian Gulf: Why Does It Matter to ...
David Des Roches: The Ongoing War in the Persian Gulf: Why Does It Matter to ...David Des Roches: The Ongoing War in the Persian Gulf: Why Does It Matter to ...
David Des Roches: The Ongoing War in the Persian Gulf: Why Does It Matter to ...
Westminster Institute
 
US Strategy in the Middle East till 2020: Will it Work?
US Strategy in the Middle East till 2020: Will it Work?US Strategy in the Middle East till 2020: Will it Work?
US Strategy in the Middle East till 2020: Will it Work?
Westminster Institute
 
Which Revolution Will Succeed in Sudan?
Which Revolution Will Succeed in Sudan?Which Revolution Will Succeed in Sudan?
Which Revolution Will Succeed in Sudan?
Westminster Institute
 
Sean McFate: The New Rules of War: Victory in the Age of Durable Disorder
Sean McFate:  The New Rules of War: Victory in the Age of Durable DisorderSean McFate:  The New Rules of War: Victory in the Age of Durable Disorder
Sean McFate: The New Rules of War: Victory in the Age of Durable Disorder
Westminster Institute
 
Wibawanto Nugroho: Understanding the Existence and Latent Threat of Islamist ...
Wibawanto Nugroho: Understanding the Existence and Latent Threat of Islamist ...Wibawanto Nugroho: Understanding the Existence and Latent Threat of Islamist ...
Wibawanto Nugroho: Understanding the Existence and Latent Threat of Islamist ...
Westminster Institute
 
Christopher Harmon: The Terrorist Argument: Modern Advocacy and Propaganda
Christopher Harmon: The Terrorist Argument: Modern Advocacy and PropagandaChristopher Harmon: The Terrorist Argument: Modern Advocacy and Propaganda
Christopher Harmon: The Terrorist Argument: Modern Advocacy and Propaganda
Westminster Institute
 

More from Westminster Institute (11)

Dean Cheng: How China Sees the World
Dean Cheng: How China Sees the WorldDean Cheng: How China Sees the World
Dean Cheng: How China Sees the World
 
The Nature of Putin’s Regime and the Reasons for its Foreign Policy
The Nature of Putin’s Regime and the Reasons for its Foreign PolicyThe Nature of Putin’s Regime and the Reasons for its Foreign Policy
The Nature of Putin’s Regime and the Reasons for its Foreign Policy
 
Harun Maruf: Al Shabaab Update and Strategic Plan
Harun Maruf: Al Shabaab Update and Strategic PlanHarun Maruf: Al Shabaab Update and Strategic Plan
Harun Maruf: Al Shabaab Update and Strategic Plan
 
Dr. Patrick M. Cronin: Total Competition: The China Challenge in the South
Dr. Patrick M. Cronin: Total Competition: The China Challenge in the SouthDr. Patrick M. Cronin: Total Competition: The China Challenge in the South
Dr. Patrick M. Cronin: Total Competition: The China Challenge in the South
 
Paul Marshall: Indonesia's Muslim Counter Radicalization Movements
Paul Marshall: Indonesia's Muslim Counter Radicalization MovementsPaul Marshall: Indonesia's Muslim Counter Radicalization Movements
Paul Marshall: Indonesia's Muslim Counter Radicalization Movements
 
David Des Roches: The Ongoing War in the Persian Gulf: Why Does It Matter to ...
David Des Roches: The Ongoing War in the Persian Gulf: Why Does It Matter to ...David Des Roches: The Ongoing War in the Persian Gulf: Why Does It Matter to ...
David Des Roches: The Ongoing War in the Persian Gulf: Why Does It Matter to ...
 
US Strategy in the Middle East till 2020: Will it Work?
US Strategy in the Middle East till 2020: Will it Work?US Strategy in the Middle East till 2020: Will it Work?
US Strategy in the Middle East till 2020: Will it Work?
 
Which Revolution Will Succeed in Sudan?
Which Revolution Will Succeed in Sudan?Which Revolution Will Succeed in Sudan?
Which Revolution Will Succeed in Sudan?
 
Sean McFate: The New Rules of War: Victory in the Age of Durable Disorder
Sean McFate:  The New Rules of War: Victory in the Age of Durable DisorderSean McFate:  The New Rules of War: Victory in the Age of Durable Disorder
Sean McFate: The New Rules of War: Victory in the Age of Durable Disorder
 
Wibawanto Nugroho: Understanding the Existence and Latent Threat of Islamist ...
Wibawanto Nugroho: Understanding the Existence and Latent Threat of Islamist ...Wibawanto Nugroho: Understanding the Existence and Latent Threat of Islamist ...
Wibawanto Nugroho: Understanding the Existence and Latent Threat of Islamist ...
 
Christopher Harmon: The Terrorist Argument: Modern Advocacy and Propaganda
Christopher Harmon: The Terrorist Argument: Modern Advocacy and PropagandaChristopher Harmon: The Terrorist Argument: Modern Advocacy and Propaganda
Christopher Harmon: The Terrorist Argument: Modern Advocacy and Propaganda
 

Recently uploaded

04062024_First India Newspaper Jaipur.pdf
04062024_First India Newspaper Jaipur.pdf04062024_First India Newspaper Jaipur.pdf
04062024_First India Newspaper Jaipur.pdf
FIRST INDIA
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
46adnanshahzad
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
rbakerj2
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
Pragencyuk
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
CIkumparan
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
Abdul-Hakim Shabazz
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 

Recently uploaded (10)

04062024_First India Newspaper Jaipur.pdf
04062024_First India Newspaper Jaipur.pdf04062024_First India Newspaper Jaipur.pdf
04062024_First India Newspaper Jaipur.pdf
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 
Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
 
Hogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returnedHogan Comes Home: an MIA WWII crewman is returned
Hogan Comes Home: an MIA WWII crewman is returned
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 

Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy

  • 1. Deceiving the Sky: The Chinese Communist Threat to American Security Bill Gertz Westminster Institute October 2, 2019
  • 2. U.S. Policy Toward China • Past – conciliation and business ties • 30-Year Gamble of Engagement -- Failed • Trump: Economic security/national security • Focus on Pressuring China economically • Militarily – Slight pressure, some continuity • Intelligence – Crackdown on econ espionage
  • 3. U.S. Policy Toward China • NSS: China challenge: – Against American power, influence, and interests – Attempting to erode American security and prosperity – Make economies less free and less fair – Grow military – Control information and data to repress their societies and expand their influence
  • 4. U.S. Policy Toward China • NDS: China – China is a strategic competitor using predatory economics to intimidate its neighbors while militarizing features in the South China Sea – China wants to shape a world consistent with their authoritarian model —gaining veto authority over other nations’ economic, diplomatic, and security decisions
  • 5. U.S. Policy Toward China • NDS: China – China is leveraging military modernization, influence operations, and predatory economics to coerce neighboring countries to reorder the Indo-Pacific region to their advantage. – All-of-nation, long-term strategy seeking Indo- Pacific regional hegemony in the near-term and displacement of the United States to achieve global preeminence in the future.
  • 7. VP Pence Speech October 2018 – China using economic, diplomatic, military to expand influence in more proactive ways – Trump seeking new approach based on fairness, reciprocity, respect for sovereignty – Since1991 trade concessions under assumption a free China was inevitable. Hope unfulfilled. – Made in China 2025 – dominate advanced tech – Greater repression; Expanding military
  • 8. VP Pence Speech October 2018 – Election meddling: “China wants a different American President.” – Propaganda and Censorship Notice: “Strike accurately and carefully, splitting apart different domestic groups” in US – Senior U.S. intel official: Russian influence ops pale in comparison to what China is doing.
  • 9. Chinese Ideology – Derived from Soviet Marxism-Leninism – Historical China/Communist China – Xi Jinping’s ‘China Dream’ Blends Both for Global Supremacy – Reality: PRC is a revolutionary communist state engaged in ‘enemy politics’ vs. U.S. – Extensive use of lies and deception: HK protests
  • 10. Chinese Ideology “To sustain a communist system such as the PRC's and to enhance internal unity under the CCP, Chinese supreme leaders after Mao Zedong, from Deng Xiaoping and Jiang Zemin to Hu Jintao and Xi Jinping, all diligently campaigned to create an image of the US government as the monstrous superpower determined to ‘contain’ China in each and every way. Chinese supreme leaders use this theory of a US-led capitalist conspiracy to destroy socialist China as the most potent justification for maintaining a draconian totalitarian social order and an increasingly technologically sophisticated, authoritarian and omnipotent national security state.” --- Miles Yu, professor, U.S. Naval Academy
  • 11.
  • 12. Xi Jinping – Since 2012, major purge of CCP, PLA, intel – ‘Party-ization’ of PRC Government – Military becoming unstable – Expansion of United Front Work – 19th Party Congress: Assumed New Power • Xi Jinping Thought in Constitution • Ended term limit – Party Leader for Life
  • 13. PAP police armored vehicles dispatched from Chongqing to Chengdu, where police surrounded the US consulate to try and apprehend defector Wang Lijun, February 2012
  • 14.
  • 15.
  • 16. Engagement with China – Began with Kissinger and the ‘China Card’ – Continued under successive administrations – Accelerated during Clinton: WTO (2001) – Nuclear and space cooperation led to Chinese nuclear espionage and missile improvement – Trump initiated a major shift – Trade war is outward sign of new new policy
  • 17. A Chinese Intelligence ‘Storm’ “The Chinese intelligence storm impacting the US is a secret assault on America that is without parallel since that mounted by Moscow in the 1930’s and 40’s. Beijing’s ongoing intelligence campaign has garnered no more than episodic public attention, and then only when a spy is arrested or a high-profile cyber-attack detected.” --- Mark Kelton, former CIA counterintelligence director
  • 18. CIA Intelligence Disaster – Beginning in 2010, China began arresting recruited CIA assets – Within in a few years, at least 27 CIA recruits were caught by MSS – All imprisoned or executed – In one case, an agent was shot in a building courtyard in front of a group of officials – Cause: Either traitor(s) in agency or communications compromise, or both
  • 19.
  • 20.
  • 22.
  • 23. Headquarters, United Front Work Department, Beijing
  • 24. Chinese propaganda insert in major U.S. newspapers
  • 25. Zhao Qianli, MPS official arrested at Key West NAS, Sept. 2018
  • 26. Ministry of Public Security headquarters, Beijing
  • 27. Convicted Chinese spy and former DIA officer Ron Hansen
  • 28. Convicted Chinese spy, former CIA officer Kevin Mallory
  • 29. Former CIA officer Jerry Chun Shing Lee, plead guilty to spying for China
  • 30. Ministry of State Security headquarters, Beijing
  • 31. 4PLA General Staff Department/Electronic Countermeasures and Radar Department
  • 33. China Cyber • Among the most significant state cyber threats • 20-year massive global program of cyber espionage, cyber reconnaissance • Ministry of State Security, 2PLA, 3PLA, Unit 61398 • Espionage, economic and traditional, and network attack and sabotage through digital sleeper agents • U.S. reluctant to disclose extent
  • 34. China Cyber • PRC cyber ops most secret program; Beijing denies all • Obama admin sought talks, norms –No results • Trump admin using tariffs, pressure, indictments • Industry urging more muscular response
  • 35. PLA hacker Unit 61398, Shanghai
  • 36. Huawei Technologies CFO Meng Wanzhou
  • 37.
  • 38. Cyber warfare • PLA has made cyber warfare a priority • Use civilian hackers. • Byzantine Hades: Massive global program of cyber espionage. Google, RSA, Lockheed • Cyber attacks: For espionage and future sabotage through digital sleeper agents • U.S. reluctant to disclose extent • Mandiant report exposed, Pentagon report
  • 39. Indictment of Chinese hackers, October 2018
  • 41. F-22
  • 42. F-35
  • 43. J-20
  • 44.
  • 45.
  • 47. DF-ZF hypersonic glide vehicle from Global Times
  • 50. WZ-8 High Altitude and High Speed Reconnaissance Drone
  • 52. Long March 11 Rocket with Dong Ning ASAT Kill Vehicle
  • 53.
  • 55. Yilong-1 Wing Loong armed UAV
  • 56. Strategic Nuclear Forces • China is engaged in a major, covert strategic nuclear forces buildup. New missiles, warheads, MIRVs, EMP weapons, Missile Defenses • No engagement in talks on types, numbers, controls. • PRC nuclear forces built on stolen U.S. nuclear secrets, later proliferated Pakistan, Iran, NK, Libya. • US Intel: 240 strategic warheads. Russia: 1,500 • Great Underground Wall
  • 57. Section of 3,000-mile-long Underground Great Wall nuclear complex
  • 58.
  • 59.
  • 60. CCP outlet Global Times 2013 depiction of SLMB nuclear strikes on Los Angeles
  • 61.
  • 62.
  • 63. PLA electronic jammers, Mischief Reef
  • 64. PLAN Type 056 corvettes, Mischief Reef
  • 68.
  • 69. PLAN warships near Senkakus
  • 70. Taiwan • China’s main target. Unfinished communist revolution • U.S. (unofficial) ally. 1979 TRA: defensive arms, protection from forcible reunification • Arms sales declining. Obama refused new F-16 C/Ds. Trump approved 66 new F-16Vs • Past détente facilitates China strategy • Flashpoint in U.S.-China relations
  • 71. Rioting in Xinjiang/East Turkistan. Over 1 million Ughurs in detention camps
  • 72. Xi Jinping and Kim Jong Un, March 2018, Beijing
  • 73. North Korean KN-08 ICBM carried on Chinese launcher
  • 74. New U.S. Policy Toward China • Declare PRC/CCP ‘enemy,’ disengage • Financial warfare as in ‘80s v. Soviets • Aggressive information operations • Strict reciprocity • Increased intelligence, counterintelligence • Reform diplomatic system
  • 75. New U.S. Policy Toward China • New democratic alliance in Asia • Restrict Chinese activities in US • Expand regional, global missile defenses • Counter and engage in ‘gray zone’ war • Create Free China parliament in exile • Play ‘Russia card’

Editor's Notes

  1. Pence China speech Oct. 4.
  2. Major senior-level political unrest
  3. HK, architect of U.S.-China Engagement
  4. China’s social control system
  5. Headquarters of United Front Work Department
  6. Zhao Qianli, Ministry of Public Security official, arrested at Key West Naval Air Station, September 2018
  7. Ministry of Public Security, Beijing
  8. Ron Hanson, former DIA contractor indicted for passing classified information to China. Plead guilty in March 2019
  9. Former CIA officer Kevin Mallory, found guilty in June of selling secrets to China.
  10. Jerry Chun Shing Lee, 53, was arrested by F.B.I. agents in January after federal prosecutors accused him of illegally possessing classified information. Plead guilty in May 2019
  11. Ministry of State Security, Beijing
  12. Seasons Hotel and Headquarters/Jintang Hotel in north Beijing
  13. “Sleeper agents.
  14. “Sleeper agents.
  15. Unit 61398
  16. Huawei Technologies Meng Wenzhou, CFO
  17. “Sleeper agents.
  18. Su Bin 2014
  19. F-22
  20. F-35
  21. Long March 11 Rocket with Dong Ning ASAT Kill Vehicle
  22. Wu-14 HGV from Global Times
  23. Long March 11 Rocket with Dong Ning ASAT Kill Vehicle
  24. Long March 11 Rocket with Dong Ning ASAT Kill Vehicle
  25. Long March 11 Rocket with Dong Ning ASAT Kill Vehicle
  26. Long March 11 Rocket with Dong Ning ASAT Kill Vehicle
  27. Long March 11 Rocket with Dong Ning ASAT Kill Vehicle
  28. Yilong-1Wing Loong ) Armed UAV
  29. Global Times, Oct. 30, 2013: Image caption: Speculated Destructive Effect Assessment for China's DF-5B Intercontinental Ballistic Independently Targeted Nuclear Warheads Strike on Los Angeles   Top to bottom: Nuclear warhead main destruction range; Radioactive dust contamination belt   The picture shows the overall destructive effect assessment of an intercontinental missile strike against Los Angeles. The black circles are the area directly destroyed by five nuclear warheads.
  30. Global Times, Oct. 30, 2013: Speculated Overall Destructive Effect Assessment of China's Intercontinental Nuclear Missiles Hitting Seattle   [From left to right]: Seattle; 3 Days; Projected range of radioactive dust spread; 7 Days; 30 Days   In general, after a nuclear missile strikes a city, the radioactive dust produced by 20 warheads will be spread by the wind, forming a contaminated area for thousands of kilometers. The survival probability for people outdoors in a 12,000 to 14,000 kilometer radius is basically zero. Based on the actual level of China's one million tons TNT equivalent small nuclear warhead technology, the 12 JL-2 nuclear missiles carried by one Type 094 nuclear submarine could cause the destruction of five million to 12 million people, forming a very clear deterrent effect.
  31. Senkakus
  32. November 2013, China unilaterally declares ADIZ. US, Japan, S. Korea reject
  33. PLA ships near Senkakus. Declared core interest.
  34. Rioting in Xinjiang