Red Star Over Washington

by Kenneth R.Timmerman

The AmericanSpectator

May,1999


The case of Wen Ho Lee and the W-88warhead should come as no surprise. From the start, the Clintonadministration has spared no expense--even that of U.S. security--tocourt the People's Republic of China.


Kenneth R. Timmerman is acontributing editor for Reader's Digest and a frequent contributor toThe American Spectator.


ForPaul Redmond, the CIA spycatcher who caught Aldrich Ames, the case ofthe Chinese government espionage ring operating at the very heart ofthe U. S. nuclear weapons establishment was "worse than theRosenbergs." Not only had the design secrets of our most advancednuclear warhead been delivered lock, stock and barrel to Peking, butthe Chinese had been able to operate inside our labs for more than 14years, from 1985 until this March, apparently undetected.

But unlike Julius and Ethel Rosenberg, whowere executed in 1953 for delivering atom bomb secrets to the SovietUnion, the Taiwan-born suspect who worked at the Los Alamos NationalLaboratory was merely fired from his job-- and that was only afterdetails of the case were revealed by the New York Times. Even moreunsettling: The Department of Energy, which oversees the labs,revoked Wen Ho Lee's Top Secret security clearance only thisFebruary, despite warnings dating back to 1995 from itscounterintelligence office of ongoing Chinese efforts to acquire U.S.nuclear weapons secrets.

The case of Wen Ho Lee, who allegedlycompromised the secrets of the W-88 warhead used on our Tridentmissile system, is not the only one in which the Clintonadministration's cavalier attitude toward nuclear weapons andnational security has encouraged spying. In December 1997, anotherTaiwan- born scientist working in a U.S. nuclear weapons lab, PeterLee, pleaded guilty to giving the Chinese the secrets of a highlyspecialized laser plasma system used to test nuclear weapons. Thesystem is considered crucial to maintaining the viability of the U.S.nuclear weapons stockpile, now that the major nuclear powers haveagreed to a moratorium on nuclear testing. Until the invention of thelaser system, the U.S. had to actually detonate nuclear weapons fromthe stockpile to ensure that they worked. "This system gives Chinathe means to test new weapons and to validate their designs, withoutanyone having a clue to what they are doing," a former U.S.intelligence officer told TAS. For his crime, Peter Lee was fined$20,000 and sentenced to 12 months in a halfway house, from which hehas since been released.

It seems that every day brings newrevelations about Chinese spying in the United States and the weaponsprograms that have been compromised. Yet National Security AdvisorSamuel "Sandy" Berger continues to assert that the White House hasresponded "swiftly" to each case. In his solo news conference onMarch 19, President Clinton was flustered when a reporter asked aboutthe theft from one of the labs of an Electromagnetic Pulse (EMP)weapon--a Top Secret, non-nuclear device that destroys an enemy'ssilicon-based computer chips, and thereby his ability to communicateand to use most of his weapons. "You say they stole? Is that the wordyou used?" Clinton replied, buying time. Then: "To the best of myknowledge, no one has said anything to me about any espionage whichoccurred by the Chinese against the labs during my presidency. " Evenin the arena of national security, Bill Clinton invokes the Lewinskydefense of legalese and potentially faulty recollection.

The cases of Chinese nuclear spying revealedto date are "perhaps just the tip of an iceberg," says SenatorRichard Shelby, the powerful chairman of the Senate Select Committeeon Intelligence. The reason is simple, and systemic: From its firstdays in office this administration has disdained nuclear weapons,seeing them as the cause of an expensive environmental clean-up, notthe cornerstone of fifty years of world peace. Add the belief that wemight share U.S. military technology with the Chinese, because wewill always stay " one step ahead" of potential adversaries, and theresult is contempt for any form of national security export controls.Whether it's nuclear weapons secrets from our labs, or supercomputersand advanced telecommunications gear from Silicon Valley, thisadministration has presided over the greatest transfer of militarytechnology to a potential adversary of any administration in history.Repeated statements by Clinton and his advisors on the need to"engage" China, regardless of the spying scandals, can only encouragethe Chinese to go for more.

The Cox Report

Further evidence of Chinese spying is foundin a 700-page, still-classified report compiled by the House SelectCommittee on U.S. National Security and Military-Commercial Concernswith the People's Republic of China, established last year to examinethe impact on U.S. national security of U.S. technology transfers toChina (See "Loral Exams," TAS, July 1998). When Chairman ChristopherCox offered a vague summary of the Select Committee's findings onDecember 30, he promised that more details would follow once thereport had been scrubbed to protect classified sources andintelligence-gathering methods. Three months later, theadministration was still fighting to keep the report secret.According to committee staff members, an interagency review board waseven trying to classify information taken from newspaper accounts, intheir efforts to bottle-up the scandal. Cox told reporters onDecember 30 that the Select Committee had made 38 specificrecommendations for action to remedy lax security arrangementsgoverning U.S. technology transfer to China, and confirmed that theassistance provided by Hughes Aerospace and Loral to the Chinesefollowing the failure of a Chinese rocket in 1996 had harmed U.S.national security. "The technology transfer that has occurred goesbeyond the examples of the Loral and Hughes cases," Cox added. " Itgoes beyond, indeed, missiles and satellites, and includes militarytechnology. And the technology acquisition efforts of the PRC havebeen targeted at the United States for a period of at least twodecades, undoubtedly longer."

TAS has learned that the most sensitivesection of the report for the White House does not deal with thesatellite launches, or even the theft of W-88 nuclear weapons design.The White House leaked that information to the press in an apparenteffort to inoculate the public against the worst of the Cox Reportrevelations: details of how the People's Republic of China has usedits extensive network of commercial companies in the United States toprocure highly sensitive U.S. military technology and otherwise spyagainst the United States. Based on interviews with FBI agents,Customs Service investigators, Pentagon technology security officers,and other intelligence agencies, the message of the Cox Report isdevastating in its simplicity: Communist China is spying the pantsoff us, and it is using some 1,000 commercial companies, employingmore than 10,000 Chinese nationals residing in the United States, todo so. "The weapons suppliers and procurement companies are alsocollectors," says one source familiar with the report's conclusions."The operations that led to some of our most significant losses werenot run by (China's) Ministry of State Security, but were done rightout of those companies, which are closer to cabinet departments thancommercial companies." The administration is desperate to quash thisinformation because it has done nothing to curtail Chinese spying inthe U.S. since Clinton claimed the White House. Some would say thepresident and his policies actively encouraged the Chinese to expandtheir intelligence and influence- peddling operations in the UnitedStates.

U.S. law enforcement officials say they are"overwhelmed" by the sheer number of Chinese Communist agentsoperating in the United States, and can only focus on a fewhigh-profile cases. On February 11, for instance, Customs undercoveragents in Boston arrested Chinese national Collin Shu (a.k.a. ZhihongXu) on charges of attempting to purchase state-of-the-art fiber-optics gyroscopes (FOGs) used in guidance and navigational systemsfor ballistic missiles and combat aircraft. An affidavit by the chiefCustoms agent involved in the case shows that Shu and another Chinesenational, Yao Yi, had initially attempted to buy the gyroscopes fromtheir Massachusetts manufacturer and have them shipped directly toPeking, supposedly for use in various Chinese universities. Butbecause the gyroscopes were purely military items, their export wascontrolled by the Department of State, which denied them alicense.

Next, Shu and Yi shifted their business toLion Photonics in Montreal, Canada, a company they had set up"specifically for the purpose of sending technology to China,"according to Special Agent in Charge Allan Doody, who oversaw theinvestigation in Boston. "They were hoping to get around the U.S.licensing requirement by claiming the gyros would be used in Canada,"Doody tells TAS. When that also failed, they tapped a smallMontreal-based computer company run by Chinese nationals to make thepurchase, but they neglected to change the wording in their purchaseorder. The manufacturer smelled a rat and contacted the U.S. CustomsService, which set up a dummy company to handle the sale, gatheringevidence that led to the February arrest. "For every case like thisone," a Customs agent says, "there are probably a hundred other caseswe never see at all. We only catch these cases because we get lucky,or because someone tips us off. When the Chinese work with onlyChinese networks, we never see a thing."

Why Spy If You Can Get It forFree?

I have been investigating Chinese high-techespionage activities in the United States since 1993, and discoveredearly on just how sensitive a subject this can be. As a congressionalstaffer working for California Democrat Tom Lantos, I requestedlicensing records of U.S. high-tech exports to China from theDepartment of Commerce. When Commerce finally delivered the several-thousand-page print-out to the Rayburn House Office building in lateMarch 1993, I was prevented for three weeks from even looking itover, despite the fact that the information was not classified.Leading the charge to prevent my access was Rep. Sam Gejdenson(D-Conn.), currently slated to become chairman of the HouseInternational Relations Committee if the Democrats win back thechamber in 2000, and his top staffer John Scheibel, who went on tobecome a Washington, D.C. lobbyist for a computer export lobbyinggroup. They did not want the story to leak out of just how much dual-use technology U.S. companies had been allowed to sell to the Chinesemilitary, for fear that would impede the U.S.-China high-techpipeline.

Unbeknownst to most people at the time was aplan devised by top Clinton administration appointees to lift exportcontrols on a wide range of strategic technologies. The plan wasfirst laid out in a 1992 National Academy of Sciences study authoredby William Perry, Ashton Carter, and Mitchel Wallerstein, who allwent on to top Pentagon jobs under Clinton. Calling export controls a"wasting asset," they argued that for U.S. high- tech firms tomaintain a technological edge over their foreign competitors theyneeded to be allowed to export ever-more sophisticated equipment, sothey could plow those profits into developing new technologies. Whatbegan as an academic study in 1992 soon became election strategy, asClinton's campaign manager Ron Brown set out to woo corporate Americato the Democrats. First to join the Democrats' bandwagon with heftycampaign contributions and high-profile political support was theSilicon Valley computer industry, led by John Sculley, then-CEO ofApple, and Ed McCracken of Silicon Graphics.

After the election, William Perry becamedeputy secretary of defense and went to work putting the plan intoaction within the bureaucracy. Ron Brown, as secretary of commerce,was tasked with selling the decontrols to corporate America andCongress as part of an administration-wide "Trade Promotion" package,aimed at creating jobs and "growing" U.S. exports. On September 30,1993, Brown issued a landmark report, "Toward a National ExportStrategy," which first made the argument--oft-repeated until theLoral-Hughes satellite scandals erupted last year--that eachadditional $1 billion in U.S. exports creates 20,000 jobs in the U.S.Brown's report urged the administration and Congress to facilitateexports to ten "Big Emerging Markets." It just happened that thelargest of those markets, Communist China, was most interested inpurchasing precisely the type of technology that had long beensubject to export restrictions because of its military and strategicapplications. (As it turned out, U.S. companies exporting to Chinaexported technology and jobs, since the Chinese required them tobuild factories in China to replace products they would otherwise buyfrom America.)

Regulations governing export controls spanhundreds of pages, and are required under the Export AdministrationAct (EAA), first passed in 1979 to ensure that U.S. high-tech goodscould not enhance the defense industries in Soviet bloc countries andCommunist China. In 1993 and 1994 the administration tried to rewritethe EAA to eliminate most controls, but Congress balked; so theysimply made an end run around the law, and dismantled the controlsthrough executive branch regulations. The administration's effortsreduced the voluminous licensing lists I had once received, andDefense Department officials now complain there are no more recordsof what has been shipped to the Chinese military--and thus no way togauge the damage to U.S. national security. Like small-time hoodsdreaming of the perfect crime, Clinton's "best and brightest" thoughtthey had covered up all traces of their acts.

After leaving the Hill in late 1993, Ijoined Time magazine. After a three- month investigation into Chineseprocurement activities in the United States, I discovered the sale toa Chinese state-owned aerospace firm, CATIC, of virtually an entiredefense plant owned by McDonnell Douglas in Columbus, Ohio, where theB-1 bomber had been made. The CATIC deal was part of an audacious,and until then unreported, Chinese effort to buy cutting-edge U.S.defense manufacturing gear at auctions, as more and more defenseplants closed in response to the Pentagon's defense build-down. Mystory was pulled by Time the week O.J. Simpson burst onto the frontpages--but not because of O.J. The Commerce Department had written aletter to Time's editors (which I subsequently obtained), calling myreporting "one-sided" and "unfair"--all this before my story was evenprinted! Time fired me within hours.

The American Spectator published my articlesome six months later ("China Shops," March 1995), and has sincepublished nearly a dozen of my feature- length investigations ofChina's creeping infiltration of U.S. society. When I exposed theefforts of Defense Secretary William Perry to help the Chinese buyhighly sensitive U.S. telecommunications gear over the objections ofthe National Security Agency ("Peking Pentagon," April 1996), Perrythreatened to sue this magazine for defamation. Instead, he calledprominent conservatives to his office in an attempt to organize acounter-attack against me. Meanwhile, I learned, photocopies of myarticle were being passed around gleefully behind Perry'sback.

Making the Chinese Feel at Home

Congressman Cox at first intended to pursuemy investigation into a Chinese government procurement ring inCalifornia ("California Take-Out," TAS, November 1998), but abandonedthe effort for lack of time and resources. Instead, he focused on thelarger picture of Chinese intelligence and procurement operations inthe United States--operations which have blossomed like a thousandflowers under the security-lax Clinton administration.

One of the more shocking details I uncoveredin my investigation of China's California networks was that a frontcompany owned by the PLA's largest weapons manufacturer had set upshop directly above the CIA office responsible for contacts with U.S.aerospace manufacturers in the Los Angeles area, where some of theagency's most secret projects have been developed. The Chineseoperated there for more than two years without the CIA ever knowing,U.S. law enforcement officers in the L.A. area told me.

Given what we are now beginning to learnfrom the W-88 spy case, this monumental security lapse seems not anaccident but a natural consequence of the Clinton administrationpolicy. Deputy National Security Advisor Gary Samore, the officialput in charge of the W-88 investigation at the White House, revealedthe administration's attitude to Chinese spying when he spoke to agroup of national security experts and reporters at the CarnegieEndowment in Washington, D.C. on March 17. "China's strategiccapabilities are quite limited," and include "less than two dozenlong-range systems" capable of reaching the United States, Samoreexplained. "But if our policy convinces China that we are a threat,then that increases the possibility that China will devote theresources to significantly expand their strategic capabilities, andit is not in our interest to see that happen." The priority, then, isreassuring China, not protecting our military secrets.

Bill Clinton and his top advisors seeCommunist China as a strategic partner of the United States, not apotential adversary. During his March 19 press conference, Clintonrecited the litany of all the good things China has done in responseto the administration's policy of engagement. "I think if we hadn'tbeen working with China, China would not have signed theComprehensive Test Ban Treaty, the Chemical Weapons Convention,"Clinton said. "They would very likely not have refrained fromtransferring dangerous technology and weaponry to countries that wedon't believe should get it. I doubt if they would have helped us asmuch as they have to try to contain the North Korean nuclear threator that we would have had the level of cooperation we had in tryingto limit the Asian financial crisis." But many of Clinton'sassertions are a matter of dispute, with Congress complaining thatChina has actually encouraged North Korea to up its price for openingan underground nuclear facility, and that China has continued to sellnuclear and missile technology to Iran, despite U.S. efforts to stopthem.

The Pentagon has been engaged for the pasttwo years in an extraordinary series of military-to-militaryexchanges and "confidence-building measures" with the People'sLiberation Army, which include the presence of Chinese militaryobservers at U.S. military exercises and visits to U.S. nuclearweapons labs. No reciprocal lab visits are allowed in China. Duringlast July's Cope Thunder war games, which are the largest jointmilitary exercises the U.S. holds with our Association of South EastAsian Nations (ASEAN) allies, the Chinese were first-hand witnessesat command headquarters when a computer glitch brought U.S. re-supplyefforts grinding to a halt. "That provided the Chinese with atremendous piece of intelligence," an aide to Republican CongressmanDana Rohrabacher said. "They were able to see first- hand howdependent we are on computers to run our entire military. It's noaccident that the Chinese have been devoting tremendous resources todeveloping new information warfare techniques to capitalize on thisvulnerability." According to a January 1999 Pentagon report toCongress on the security situation in the Taiwan Strait, "the PLA hasincorporated (information warfare)-related scenarios into severalrecent operational exercises," putting into practice what theylearned at last year's Cope Thunder. (Rohrabacher has been carefullymonitoring the build-up of Chinese military capabilities for sometime, and provided first-hand testimony of China's militaryoccupation of the disputed Spratley Islands in the South China Seawhen the Philippine air force flew him over Chinese warships anchoredoff the islands last December. For his efforts, he earned a WhiteHouse reprimand for interfering with U.S. foreign policy.)

The U.S.-Sino defense exchange program wasdreamed up by William Perry following the Taiwan Strait crisis inFebruary 1996, as a means of increasing the comfort level of theChinese (who had been made decidedly uncomfortable when two U.S.aircraft carrier battle groups steamed off the Chinese coast as awarning to Peking to cease its intimidating missile strikes duringthe Taiwanese presidential election campaign). TAS has obtained acopy of this year's exchange program "gameplan." For March it showsthe U.S. training a delegation of Chinese military procurementofficers in program management, a set of skills sorely lacking in thePLA's weapons development efforts. In April the U.S. was scheduled tohost a PLA Air Force logistics delegation. In June the PLA has beeninvited to observe a National Training Center demonstration by the82nd Airborne, to include future-generation unmanned battlefieldaerial surveillance vehicles (UAVs), remotely-targeted missiles, andbattlefield management computer systems.

Also in June, a flight of U.S. Air ForceC-130 and C-17 military transport aircraft will visit Peking,schooling the Chinese in how to improve their ability to airlifttroops and materiel, skills undoubtedly of great use, say, inproviding relief to flood victims (though also potentially helpful inmoving troops across the Taiwan Strait). In August and September, theChinese will attend an eight-week-long seminar in Hawaii on militarymedicine, perhaps in the hope of encouraging them to joininternational humanitarian missions. For several weeks in October andNovember, the PLA will participate in a workshop at the SandiaNational Nuclear Laboratory on "cooperative monitoring," where thesecrets of U.S. weapons-monitoring efforts, such as those arrayedagainst Iraq, will be shared. Both Secretary of Energy Richardson andNational Security Advisor Sandy Berger have said the lab visits willnot be canceled in the wake of the W-88 spy scandal, because there is"no evidence" that spying has occurred during foreign visits to U.S.nuclear labs or that any nuclear weapons information has beencompromised.

But in fact, the Department of Energyitself, in a 1983 report, acknowledged that "a significant amount ofimportant technology may have been lost to potential adversariesthrough visits" to the labs, a conclusion buttressed by a 1988General Accounting Office review. On March 15 of this year, SenateIntelligence Committee Chairman Richard Shelby called on theadministration to suspend Chinese visits to U.S. nuclear labs, since"the counterintelligence measures initiated by Secretary BillRichardson will require several years to be fullyimplemented."

The Maloof Memo

When the Clinton administration took powerin 1993, the Chinese had two ICBMs capable of targeting the UnitedStates. Today, says Deputy National Security Advisor Gary Samore,that has grown to "less than two dozen." But thanks to the theft ofthe W-88 warhead design, and the transfer by U.S. satellitemanufacturers of technology used to boost multiple satellites todifferent orbits, the Chinese may be able to put up to five MultipleIndependent Reentry Vehicle (MIRV) warheads on each missile.According to reports for the Office of Naval Intelligence, theChinese will soon begin building two new-generation missile systems,the DF-31 and DF-41, also equipped with multiple warheads, whichcould expand their nuclear forces exponentially over the next five toten years. From the bottom rank among the five declared nuclearweapons states (not including India and Pakistan, which demonstratedtheir nuclear weapons capabilities last year), China will soon slipinto third place, just behind the United States and Russia. All thishas happened as a direct result of the Clinton administration'spolicy of engagement.

Similarly, prior to January 1996, whencomputer export controls were lifted after intensive lobbying fromSilicon Graphics and other top DNC contributors, the Chinese had onlythree U.S. High Performance Computers (HPCs), all of which weresubject to stringent Defense Department monitoring. In April 1997--just 14 months after the decontrol--Undersecretary of CommerceWilliam Reinsch told Congress that U.S. companies had sold 46supercomputers to Chinese end-users, and that the Chinese were notallowing the U.S. government to verify how they were being used. ByJune 1997, concerned that we were helping the PLA to improve weaponsdesign, missile targeting, and nuclear simulation, the House voted torestore licensing requirements on HPCs. But the measure wasultimately defeated under intense industry and administrationpressure.

In January 1999, Reinsch's Bureau of ExportAdministration delivered its first congressionally mandated reportdetailing supercomputer exports over the preceding 12 months. Out ofa total of 390 HPCs exported by the United States during that period,191 of them had gone to China. Despite U.S. efforts, the Chinese onlyallowed government officials to inspect three of them once they hadreached China. Congressional sources tell TAS that they have beentold by administration officials that as many as 600 HPCs have beensold to the Chinese since the 1996 decontrols--more raw computingpower than can be found in the Pentagon and the Department ofEnergy's nuclear weapons labs, combined.

Supercomputers are only one element in adeadly mix of high technologies released for sale to the Chinese bythe Clinton administration since 1993. An internal memorandum writtenby Michael Maloof of the Pentagon's Defense Technology SecurityAdministration (DTSA), subpoenaed by the Cox committee, paints anastonishing picture of the cumulative impact of U.S. technologytransfer to the Chinese military over the past five years. Thecombination of supercomputers, satellite sales, and advancedtelecommunications switching technology since 1994 "have provided theChinese military with a nationwide encrypted command, control,communications, computers and intelligence (C4I) network that willserve it well into the next century," Maloof warned his superiors."Together, they provide the PLA with a communications infrastructurethat it could not have developed on its own."

Extensive manufacturing technologies weredecontrolled along with the actual products U.S. companies wereallowed to ship to China. Since 1993, the PLA has been importingmassive amounts of equipment to manufacture fiber- optics cable,which allows for secure communications links impervious to electroniceavesdropping. And companies tied to former colleagues of then-Deputy Defense Secretary William Perry led the way in transferringencrypted Asynchronous Transfer Mode (ATM) telephone switchingequipment, now used by the PLA for its military communicationsnetwork. "The decision to allow... ATM switching technology in 1994occurred over the objection of DoD technical experts," Maloof wrote."Despite initial NSA concerns, it was silent when the decisionfinally occurred." As I wrote in "Peking Pentagon" in April 1996, itappeared that William Perry personally intervened to get NSA to droptheir objections to the sale of this technology, despite the factthat the Chinese buyer was a PLA-owned company.

More recently, Maloof wrote, was thedecision to allow Hughes to sell more than 500 ground stations toaccompany the telecommunications satellites sold by Hughes tocompanies controlled by the Chinese military. "The VSAT groundstation terminal equipment...was supplied and wittingly installed byHughes for Chinese ground and rocket forces and the PLAAF (AirForce)," Maloof wrote. "This equipment also was available to theMinistry of State Security," and included "an additional port forencryption equipment." Chinese encryption efforts have been given "agreat boost...from the U.S. high performance computers it hasreceived and the training in software development." A spokespersonfor Hughes Network Systems, Judy Blake, declined to comment on theMaloof memo or respond to detailed questions about Hughes's businessin China. Export licensing information obtained by TAS shows that theState Department licensed the export to China of 522 Hughes telephoneground stations valued at just over $5 million in March 1996. Theultimate buyer was the China Electronic Systems Engineering Company,an entity directly controlled by the PLA's General Staff Department,according to a publicly available chart prepared by the DefenseIntelligence Agency of China's International Defense-IndustrialOrganizations. The Hughes equipment was licensed as Munitions listitems.

 


Maloof's Office of Technology Security Operations objected lastyear to the sale by Hughes of a sophisticated new communicationssatellite to the Asia- Pacific Mobile Telecommunications (APMT)consortium, which is part-owned by the PLA, "because of an anonymoustip it received in late May 1998 that the son of the deputy directorof COSTIND (the Chinese State Commission of Science, Technology andIndustry for National Defense, which ultimately controls weaponsdevelopment plans in China) was project manager of APMT at Hughes'sU.S. facility." When Hughes sought approval in 1996 to allow the son,Shen Jun, to work at Hughes, their application stated he would "beonly a translator, although as it turned out he was an APMT projectdirector," Maloof told Congress. One of the most disturbing elementsabout the APMT project was a Chinese requirement that the newsatellite be configured so that it could handle separate encryptedchannels for Chinese military communications. The Chinese beganrelying on U.S.-built civilian communications satellites in 1996,Maloof wrote, after the catastrophic failure of their militarycommunications satellites. As a result, "they had no choice but toresort to the use of previously purchased U.S. satellites for theirencrypted communications."

Maloof's charges were confirmed laconically by the Department ofDefense in a May 1998 report to Congress on PRC Militarycapabilities, which acknowledged the assistance of Westerntelecommunications firms in installing advanced telecommunicationsequipment used by the Chinese military. In a separate report on thesecurity situation in the Taiwan Strait, delivered in February 1999,the Pentagon acknowledged that the PLA communications network " usesthe same types of communications mediums as the civil network.... Themilitary's lack of communications satellites could force the PLA torely on foreign satellite services to meet military needs in wartimeor a crisis," the report stated.

As a result of these sales, one congressional source told TAS,"our ability to decrypt Chinese military communications has beenseriously degraded." Meanwhile, of course, the capabilities of theChinese military have been greatly expanded. But all of that fallsunder the Clinton administration priority of making the ChineseCommunists feel more comfortable.

More scandals will emerge once the Cox report is finallydeclassified and made public. But one thing is certain: Nothing isgoing to stop the Clinton administration from pursuing its policy ofengaging the Chinese military and selling off U.S. security, short ofa political explosion back in the United States. What remains to beseen is whether the Republicans can capture the high ground onforeign affairs and national security issues, and get voters to careabout something other than their stock portfolios and the boomingeconomy.

 

If you want to learn more see the:

The Almost Complete Guide to Chinese and Chinagate Links on FR

China Invades Spratly Islands Links
Spratly Islands Scrapbook
China & Russia
US Dual-Use exports to China
Human Rights
PRC vs ROC
Missile Defense


From: Wallaby (wallaby@altavista.net) *
04/26/99 20:53:03 PDT


To: Wallaby
It's the economy, stupid. Even if you are irradiated.
From: doug from upland (dc4afee@keyway.net) *
04/26/99 20:59:12 PDT


To: Wallaby
Greetings to you, from me, on your own computer :-)
From: T'wit (emailname) *
04/26/99 20:59:17 PDT


To: doug from upland
Gee and I thought CO was the biggest story in the Country...
From: Jolly (emailname) *
04/26/99 21:28:10 PDT


To: Wallaby
Fantatstice article! Its just amazing how few people understand the consquences of what this administration has done. We are only now begining to undersatnd the ramifications.
From: Jolly (emailname) *
04/26/99 21:29:30 PDT


To: Wallaby
When Chairman Christopher Cox offered a vague summary of the Select Committee's findings on December 30, he promised that more details would follow once the report had been scrubbed . . .

Great post, but the part about "scrubbed" is troublesome. Do we really think the media will take the time to read between the black marker swipes on this report? And then will anyone listen? Isn't this just another shoe dropping?
From: yearling (emailname) *
04/26/99 21:49:04 PDT


To: Wallaby

"One of the more shocking details I uncovered in my investigation of China's California networks was that a front company owned by the PLA's largest weapons manufacturer had set up shop directly above the CIA office responsible for contacts with U.S. aerospace manufacturers in the Los Angeles area, where some of the agency's most secret projects have been developed. The Chinese operated there for more than two years without the CIA ever knowing, U.S. law enforcement officers in the L.A. area told me."

Does anyone here really believe the CIA didn't know what was going on above their head? Hehehe. Come on. We are doomed. Period.

Great post Wallaby!!
From: Uncle Bill (emailname) *
04/26/99 22:05:44 PDT


To: Jolly
The sheeple will understand the ramifications when the ChiComs start hurling missiles toward the Left Coast, no doubt.
From: MadAsHell (emailname) *
04/26/99 22:23:18 PDT


To: Uncle Bill
I can think of a few who would say that the CIA are "innocent". They usually appear on this forum as the "kook police"!
From: MadAsHell (emailname) *
04/26/99 22:24:55 PDT


To: Uncle Bill, yearling, Jolly, doug from upland
Also see Nuclear Secrets and the Culture Wars
From: Wallaby (wallaby@altavista.net) *
04/26/99 22:29:36 PDT


To: MadAsHell
The most amazing thing about the left is their ability to blame everyone else for problems they created. Evidence that the vast majority of people who are homeless have serious drug or alcohol problems doesn't convince them that Woodstock and the drug generation did anything bad.

Homosexual activists have frequently claimed the Catholic Church is to blame for the spread of AIDS because the church won't endorse condom use.

when the bombs fall, they'll try to blame Reagan. Count on it.
From: Richard Kimball (emailname) *
04/26/99 22:33:18 PDT


To: Uncle Bil + All!!!
The only surprise anymore to me is, if there are no more surprises.

U.B., you've highlighted the CIA and PLA in the same building and questioned how the CIA could not know what was going on. Let me add to this what my research turned up a while back: While Howard Hughes was still alive the common cliche' was, you couldn't tell where Hughes' companies left off and the CIA began. With Hughes death, the CIA completely absorbed Hughes companies and turned them into business 'fronts'; that is, fully controlled by the CIA--which explains why the CIA would be located in the very same building as the PLA, to make the operation of our being sold out more easy. All they needed to do is walk down the hall.

Metalbird was flamed recently for suggesting in his posting, "WWWIII: Raw Intelligence Data", for warning that the United States could be subject to a Chinese invasion. Note in the above post it states that there are 'more than 10,000 Chinese nationals' now in the U.S. To that, I would like to add one (perhaps) obvious comment: 10,000 THAT WE KNOW OF.
From: metalbird1 () *
04/26/99 22:45:03 PDT


To: MadAsHell
I'd like to raise the awareness a little befor ethat happens...;)
From: Jolly (emailname) *
04/26/99 23:43:40 PDT


To: metalbird1
If you haven't, read Year of the Rat. It highlights CIA involvement. If the archives were working here at FR I would link you further bits of evidence that display CIA misdeeds involving China and the tentacles stretching into the RED zone. Just to tell you how bad it is, in the 1940's Detachment 202, an OSS Chapter in CHINA, began to form the early foundations of what is now referred to as the Octopus in response to the Kim Philby betrayal of an attempt to wrestle Albania free of the Soviet bloc.

Let's see, China, Albania, and Russia. I've heard those names mentioned somewhere recently. Hmmmm.... 8-)


From: Uncle Bill (emailname) *
04/27/99 00:26:00 PDT


To: Uncle Bill
The Octopus, now there's a subject that hits a note..To Casolaro, and those before and after him, R.I.P.
From: metalbird1 () *
04/27/99 00:33:39 PDT


To: metalbird1

The Octopus - The Tentacles Of Corruption


From: Uncle Bill (emailname) *
04/27/99 00:43:57 PDT


To: Uncle Bill
I was in a sphere of interest to him, after the fact .
From: metalbird1 () *
04/27/99 00:48:59 PDT


To: Wallaby & All
Please e-mail this to your Senators and Reps regardless of their party affiliatins. That way there will be no excuse if they are dumb enough not to know what has been going on under their noses since Clinton took office.
From: enough is enough (emailname) *
04/27/99 01:03:38 PDT


To: metalbird1

Speaking of Hughes Aircraft. How's this name. William Turner. 8-)


From: Uncle Bill (emailname) *
04/27/99 01:04:44 PDT


To: Uncle Bill
I'm not familiar with his name connected in that regard; last I heard he's doing time in Tenn.
From: metalbird1 () *
04/27/99 01:15:51 PDT


To: metalbird1

At 2pm on August 9, 1991, Danny Casolaro met with Bill Turner in the Sheraton parking lot, because he feared his room was bugged. Turner gave Casolaro documentation of mismanagement at Hughes Aircraft involving the Pentagon. Turner was the business contact to see Casolaro alive. On August 10, 1991, Casolaro was found dead in his hotel room. The body is embalmed without permission from the family, the notes all disappear, and well, you know the story. Bill Turner is arrested on a bank robbery charge in September, 1991. Turner insisted that he did so to escape ending up like Casolaro. Ian Spiro, his wife and three daughters end up dead. Robert Maxwell ends up dead. Paul Wilcher ends up dead. Tax dollars at work. I love my government and believe everything they say. 8-)


From: Uncle Bill (emailname) *
04/27/99 01:31:36 PDT


To: Uncle Bill
Turner didn't provide any documents to Casolaro; he was only holding them [the documents] for Casolaro. Turner said the FBI ultimately took from him what he had retained of Casolaro's that Casolaro had given him. I don't know where you got or read about Hughes documents, but the hot button stuff was BCCI material.

Spiro was killed [and family] in a sidebar matter; he was believed to have been holding Riconosciuto's personal files; Maxwell was tied into front companies marketing a software manipulated twice over from its off-the-shelf variety.
From: metalbird1 () *
04/27/99 01:52:36 PDT


To: metalbird1

I agree with you about the BCCI material. Do you believe Kenn Thomas and Jim Keith (The Octopus - Secret Government and the Death of Danny Casolaro) are wrong about Turner giving documents to Casolaro in the parking lot?


From: Uncle Bill (emailname) *
04/27/99 02:02:35 PDT


To: Wallaby
Did we sell them enough rope to hang us?
From: bmwcyle (bmwcyle@bigplanet.com) *
04/27/99 02:03:31 PDT


To: Uncle Bill
"Giving" documents is not synonymous--though it could be mistakenly construed as such--with being the source of them. Either he was returning to Casolaro what he was holding for him or had served as an intermediary for Casolaro's source.

This next puts me in a strange position. I stand by on what I say on the BCCI, but you've caused me to go on a search and seek. I can't go through this all, but I have an item from Turner which confirms BCCI and adds this:

"On August 9, 1991 I delivered two packets of documents that I had kept for Mr. Casolaro to him in Martinsburg, W.Va. Also included was (sic) documents relating to fraud at Hughes Aircraft."
From: metalbird1 () *
04/27/99 02:25:32 PDT


To: Wallaby
So what if China gets all our military secrets? After all, it's WE who are killing children in Iraq and Yuglslavia, not China. The world will probably be better off with China at the helm - I can't imagine any Chinese leaders I would be more negatively inclined to then our own home-grown Bill Clinton's, Barney Frank's, and Maxine Water's.
From: The Duke (emailname) *
04/27/99 03:05:54 PDT


To: Wallaby and All
Anybody know what happened with the State Department document dump reported by Drudge? I believe it was Murray Waas, the Salon reporter, who had in his possession the 20,000-page leak. Was it related to Chinagate? The old FR threads about this have been 404'd.
From: Nita Nuprez () *
04/27/99 04:05:08 PDT


To: Nita Nuprez
Ask Jim Robinson what happened to the archives. This information is too valuable to not be available.
From: MadAsHell (emailname) *
04/27/99 09:40:20 PDT


To: Richard Kimball
Maybe the homosexual activists should be looking to Clinton and the blood scandal out of the Arkansas prisons to place blame.
From: MadAsHell (emailname) *
04/27/99 09:42:57 PDT


To: Nita Nuprez

Hi Nita. Most of the archives are not available. JimRob is working on getting it fixed. I hope they can all be fixed, as I believe the archives are the best thing about Free Republic.

Speaking of Murray Waas, I believe he is connected to the mafia. The following article is in FR archives, but again, it is 404'd. Look at the comments about Waas.

 

THE MOB PRESIDENT

 

The Mob Helped Clinton get Started In Politics.Ý It is Now Helping Him Escape the LawÝ

Ý

Washington Weekly
May 4, 1998

When young Bill Clinton in 1974 made his first run for political office, a crucial $10,000 loan was arranged for him by his uncle, Raymond Clinton. Uncle Raymond has been tied by Clinton biographer Roger Morris to the Hot Springs Mafia.

But it was not until 1984, when Clinton was elected for a second term as Governor of Arkansas, that Mob money really started pouring in. "That was the election when the Mob really came into Arkansas politics, the dog-track and racetrack boys, the payoff people who saw a good thing," a former U.S. Attorney told Roger Morris. "It wasn't just Bill Clinton and it went beyond our old Dixie Mafia, which was penny-ante by comparison. This was eastern and and West Coast crime money that noticed the possibilities just like the legitimate corporations did."

Among the "legitimate corporations" that noticed the possibilities with the rapidly ascending governor thirsting for power and money were front corporations for the intelligence services of the People's Republic of China. The Lippo empire came to Arkansas that year.

By then, Bill Clinton's ties to organized crime had become well- known. His half-brother Roger Clinton was convicted of cocaine distribution in association with Mob figure and Clinton money man Dan Lasater.

In the years that followed, Arkansas became a major cocaine trans-shipment point for the Mafia, crossing paths with the famous CIA Contra resupply operation at Mena.

Bill Clinton had found a most successful formula in U.S. politics: financial backing from a coalition of organized crime and hostile foreign governments.

A MERGER OF THE DIXIE, CHICAGO AND NEW YORK CRIME FAMILIES

So successful was this formula, that in 1992 Bill Clinton used it to reach the highest office, the office of the U.S. Presidency. In return for large campaign donations, the crime families would be represented in the Clinton administration. The New York Mob paid $56 million [1] and won the slot of Deputy Chief of Staff for its lawyer Harold Ickes. The Dixie Mafia paid an undisclosed amount and obtained slots for Patsy Thomasson and Buddy Young. The Chicago political machine sent Rahm Emanuel and David Wilhelm.

Harold Ickes proved his value to the Mob when he held his hand over Mob puppets Arthur Coia and Ron Carey who were under separate RICO investigations by the Justice Department. Patsy Thomasson, in charge of White House drug testing policy, saw to it that criminal figures on the White House staff would not be bothered about past and current drug use.

The People's Republic of China, in return for at least a $3 million loan through Worthen Bank, won a slot for its spy John Huang at the Commerce Department. Later followed access to advanced U.S. military technology, access to the Long Beach Naval Base, MFN trade status, and more campaign contributions.

Peripheral Mob figures Nathan Landow, Richard Ben-Veniste, and their associates Terry Lenzner and Paul Begala became part of the secret police that would keep Clinton in office despite multiple revelations of criminal offenses. Ironically, the only member of the Clinton enforcement team who has threatened the use of Mafia methods in public is James Carville. He said on television that Kenneth Starr was just one mistake away from not having any kneecaps. "Kneecapping" is a Mafia specialty. Yet the only link between Carville and the Mafia that we have been able to find so far is his partnership with Paul Begala, who admitted in a recent deposition for the Filegate trial that he was in close and frequent contact with his friend Richard Ben-Veniste, a Mob lawyer and friend of Mobster Alvin Malnik [2]. Richard Ben- Veniste has defended several drug traffickers and money launderers for the Mafia and for the DNC. Ben-Veniste also defended Bill Clinton on the Senate Whitewater panel in 1995.

It goes without saying that a Racketeering-Influenced Corrupt Organization such as the Clinton administration cannot stay in office long without a very efficient "enforcement" component to its secret police. The methods employed by this "enforcement" team include murder. The 1993 assassination of Clinton private investigator Jerry Parks was carried out by people in Hot Springs associated with Buddy Young [3]. Of all the mysterious deaths and suicides surrounding the Clinton Secret Police, this is the only one that has been solved. That does not mean that it has been prosecuted, though, for corruption of the judicial system is another necessary component of survival. White House Director of Administration, Patsy Thomasson of the Dixie Mafia, has been implicated in several attempts on the life of Dennis Patrick, a former money launderer for the Dixie Mafia who wanted out [3].

CORRUPTING THE PRESS

Survival of the Clinton administration has also been contingent upon successful corruption of the press. The most prominent Clinton operator at this time is Murray Waas, gaining fame in the mainstream media for finding a psychic in Arkansas whose son had seen money given to Whitewater witness David Hale.

Murray Waas has actually been doing opposition research for the Clinton administration for several years. His journalistic "scoops" (or are they merely ventilations of White House FBI files?) include research into the background of Kenneth Starr and into the background of Clinton critics. In this research, his Mafia-style methods have become apparent. Waas threatened to have reporter Michael Lewis killed after Lewis wrote a New Republic story looking into murder and drugs in Arkansas--a story that was unflattering of Waas [4]. Who does Waas know who would be able to enforce such a threat?

THE MISSING PIECE

If China made illegal donations to the Clinton campaign in return for mercantile and military strategic advantages, then what illegal donations have been made by Russia? The favors Clinton has made towards China pale in comparison to the favors he has made towards Russia. Billions of dollars in economic support and the maintenance of a strategic advantage in favor of Russia through the obstruction and delay of modernization of the U.S. strategic nuclear arsenal and the development and deployment of a U.S. national missile defense.

Lest gestures as these be interpreted as prudent engagement of a fledgling democracy, one should consider that it has rarely been the democratic forces in Russia, or the Russian people, that have been the beneficiaries of Clinton administration support:

(1) Clinton's point man on Russia policy is the former KGB's point man on propaganda in the U.S. His name is Strobe Talbott, a former editor at Time magazine who built his career on access to KGB officials and their Soviet propaganda [5].

(2) The Clinton administration has worked hand-in-hand with Russian Mobsters to illegally extradite whistleblowers who have revealed massive KGB-Mafia corruption in Russia [6].

(3) The FBI, through its new offices in Moscow, has become an adjunct of the corrupt KGB-Mafia bureaucracy that rules Russian society today. FBI Director Freeh has reversed himself in stating that the Russian Mafia does not pose a threat to U.S. domestic or national security [7]. Only a month earlier, Freeh had warned that 30 Russian Mafia syndicates were conducting the most sophisticated criminal operations ever seen in America based on their access to expertise in computer technology, encryption techniques and money laundering [8].

(4) Monetary aid to Russia has been diverted towards the modernization of its strategic nuclear arsenal, including a new generation of nuclear attack submarines. Other funds have been diverted to the Russian Mob.

(5) The engineer of these scams is Strobe Talbott.

Where are the records of illegal campaign donations invested by the Russian KGB-Mafia complex in the Clinton administration to maintain this profitable state of affairs? Apart from the revelation of a $90,000 donation to the DNC on behalf of suspected nuclear arms dealer Grigory Loutchansky [9], the record of this cash pipeline must be hidden inside the DNC's closely guarded campaign finance records. That is a scandal yet to surface.

THE CLINTON LEGACY

The legacy of the Clinton Presidency is the transformation of the United States into a narco republic with parts of the judicial system as corrupt as that of Colombia. Much worse than that, Bill Clinton has helped build a state-of-the-art offensive nuclear strike capability in the most dangerous nations on earth: China, Russia, Pakistan, and Iran. And the nuclear weapons of China and perhaps Russia are targeted at the U.S. Simultaneously with this build-up, Clinton has dismantled, defunded, and starved the U.S. military so that today we have a "hollow army."

The actions of President Clinton will dramatically affect the security of the United States for generations to come. He has sold out his own country in order to win and maintain the Presidency.

Notes:

Ý

[1] F.C. "Duke" Zeller in the Washington Times, October 28, 1996
Ý[2] The Miami Herald
[3] "The Secret Life of Bill Clinton," by Ambrose Evans-Pritchard
[4] "The Seducer," by Michael Lewis, The New Republic Nov. 18, 1996
[5] "Strobe Talbott: Russia's Man in Washington," by Kenneth R. Timmerman, The American Spectator, April 1998.
[6] "Clinton Administration Aids KGB in Cover-up of Communist Party Loot," Washington Weekly, Aug. 25, 1997.
[7] "Freeh Says Russian Mafia Poses no Threat," Washington Weekly, Nov. 24, 1997
[8] "FBI's man in Moscow quits after spying row," London Telegraph, Nov. 27, 1997.
[9] "Suspected N-dealer attended Clinton fund-raiser," by Christopher Ruddy, Pittsburgh Tribune-Review, Oct. 30, 1996.
Ý

Published in the May 4, 1998 issue of The Washington Weekly Copyright 1998
The Washington Weekly (http://www.federal.com)
Reposting permitted with this message intact


From: Uncle Bill (emailname) *
04/27/99 13:14:30 PDT


To: Nita Nuprez

THE SEDUCER

"Then Murray started calling again. You may recall that I quoted the narrator of the famous video expose The Clinton Chronicles, Larry Nichols, saying that a journalist named Murray Waas, who was looking into the drug trafficking in Arkansas, had called him to say that he shouldn't help me investigate the Clinton conspiracies, that I was planning to write a hatchet job on Nichols. After that piece appeared Murray bombarded me with phone calls and messages, ranging from threats to apologies for saying he planned to have me killed. Soon I took to letting other people answer my phone. But even that didn't do much good. "It's Mike Samuels for you," said my house guest, as she handed me the receiver. It was Murray, of course, using one of his pseudonyms. "I can't believe all you said to me about Hillary Clinton," he said ominously. In the end I unplugged the phones. As I did, it crossed my mind that people who apologize for making death threats are possibly more dangerous than people who don't."

"Perhaps the signal quality of both Clinton conspiracists and their chroniclers is their determination. They never give up. Murray has now taken to calling my employers to inform them he tape-recorded our phone conversations and plans to release the transcripts to The Washington Post and The New York Times. Apparently I said some pretty damning things about Hillary Clinton. I also fabricated his quotes, he says. How he arrived at this last conclusion a month after the fact, I do not know. One of Murray's last calls came to Sydney, a new tnr intern, who is polite and pleasant almost to a fault. Murray took Sydney's formality as a sign that Sydney was trying to keep him at arm's length. "You don't have to be so formal with me," Murray yelled on the phone. But Sydney is formal with everyone. After he had addressed me as "Sir," for the fourth time, I said, "Sydney, you're going to have to stop calling me that." "I'm afraid that is going to be difficult, sir."


From: Uncle Bill (emailname) *
04/27/99 14:02:24 PDT


To: Uncle Bill
Hey, Uncle Bill. Thanks for the articles. That's what I love about FR; ask and ye shall receive!
From: Nita Nuprez () *
04/27/99 17:51:14 PDT

[ Home| Latest| More| Register| Login| Logoff| Post| Search| Help!]


Free Republic,LLC - P.O. Box 9771 - Fresno, CA 93794