cue the lightning bolts

the only question that matters: is it true?

Iran has signed the NPT. As a signatory to the NPT, Iran may rightfully, legally, use nuclear technology for peaceful energy purposes. Iran has submitted to and passed repeated IAEA inspections. The US intelligence community (NIE) does not consider Iran a nuclear threat. Israel refuses to sign the NPT. Israel has an estimated several hundred undeclared nuclear weapons. Russia and China have warned that an attack on Iran will have global consequences. That's the situation in a nutshell. Where to next, people? Where to?

Have I now become your enemy by telling you the truth? - Galatians 4:16


coincidences with China and technology

1. reported last week, November 3rd: Chinese general visits STRATCOM

Xu visited a few US military bases as well as the US Naval Academy, and at the Pentagon he met with US Secretary of Defense Robert Gates for the second time. They met once before in Beijing during the first trip that Gates made to Asia as secretary of defense in 2007.

Among other things, after leaving Washington DC, Xu flew to the headquarters of the US Strategic Command (US STRATCOM) outside Omaha, Nebraska, on October 28, when he became the first PLA officer to enter that US military base. Air Force General Kevin Chilton, commander of US STRATCOM, held discussions with Xu and later hosted a dinner for him.

read more @ asia times

2. reported October 29th: is there a back-door US technology transfer to China? sure does look like it.


The notion that Chinese military personnel were provided with a US-based mail order house that shipped items on a weekly basis back to China while operating completely under the radar of the US defense and law enforcement communities for a decade is baffling. Nor does it does bode well especially for those supporters of reform who argue that existing export controls and customs oversight are adequate to meet the additional workload that any meaningful export regulatory reform will certainly trigger.

In a nutshell, customs and law enforcement agents in the US face a significant challenge as they attempt to monitor outbound technology transfers and terminate the actions of those who traffic in illegal exports.

The effects of this case will soon be magnified by the sentencing next month of Dongfan "Greg" Chung, who could spend the rest of his life in prison. A former Boeing employee, Chung was arrested in late 2008 and charged with providing classified information to the Chinese about the space shuttle and rocket technology.

read more @ asia times

3. fresh off Xu's visit to the US...Chinese president calls for "new chapter" of air force development -- coincidence?

BEIJING, Nov. 8 (Xinhua) -- Chinese President Hu Jintao on Sunday called for a "new chapter" of the development of the People's Liberation Army (PLA) air force.

Hu met with representatives of senior officers, role models and pilots of the PLA air force. The PLA air force have made huge progress in its own development over the past six decades, with remarkable contributions to the protection of China's sovereignty, safety, territorial integrity as well as to the socialist modernization of the country, Hu said.

China's national defense and the modernization of its army are facing new situations and new tasks, Hu said.

The air force have also entered a key phase of development, Hu said, urging them to develop systematic capabilities for both offensive and defensive operations.

This year marks the 60th founding anniversary of the PLA air force.


4. military trust, transparency still elude US, China

by Paul Eckert

The eye-popping economic growth that has made China an attractive business partner has also funded an even faster expansion in its military spending that has raised eyebrows among US policymakers. China's military spending, even after two decades of double-digit growth, is only about one-sixth of US outlays and American officials say they accept the huge country's legitimate need to update antiquated defenses.

But the Pentagon worries that it knows little about China's strategic intentions and sees the People's Liberation Army building capabilities that exceed Beijing's routine assertion that its military modernization is purely defensive in nature. "When we see a military growing at that rate, we're interested in transparency and understanding the uses of that military," Rear Admiral Kevin Donegan, commander of the USS George Washington Carrier Strike Group, said in Hong Kong.

read more @ kuwait times

5. related: other things that have gone missing:

September 2009: DuPont sues Chinese scientist for trade-secret theft

For the second time in less than three years, a research scientist at DuPont has been accused of misappropriating trade secrets from the company and attempting to use them to build competing products in China.
In a lawsuit filed in Delaware Chancery Court, DuPont accused Hong Meng, a former senior research scientist at the company, of stealing data on a new, thin-computer display technology called "organic light emitting diode" or OLED. DuPont claims that Meng planned to use the stolen information to develop and commercialize products using OLED technology with his alma mater, Peking University, in Beijing, which is also developing similar technology.

read more @ computerworld

and of course, the biggie:

July 2009: Did Goldman Sachs secret trading codes get out?

Goldman Sachs Group Inc. (NYSE: GS) is said to have either the best in-house and proprietary trading models or at least the best of the large bulge bracket firms. This weekend came a report from Reuters that a Russian immigrant living in New Jersey had been arrested on federal charges of stealing the secret trading codes from what is believed to be Goldman Sachs. More specifically, it was noted as the automated stocks and commodities trading operations. Authorities said the codes were uploaded to a German-based website that are worth millions in profits use top secret mathematical formulas.

read more @ 247 wall st

which is claimed, unconfirmed, to have now been given to China, also on the heels of Xu's visit to the US: Coincidence??


The TREASONOUS deal between the Obama Administration and the Chinese was struck in the last 48 hours and directs the Obama U.S. Commerce Department to hand over secret trading codes that would allow the People's Republic of China to have a 20-second lead time on ALL worldwide security, currency and commodity trading transactions.

The secret codes are tied to the Chicago Mercantile Exchange and two major on-line U.S. discount security and commodity trading companies with a direct liaison to the noted criminal firm Goldman Sachs.

read more @ tom heneghan


INCOMING!!!!!!! said...

AP All the privatisation gig in the West esp USofA corp was a cover for the stealing of tech by supra national criminal entities. ChiComms were a benificiary of that process.

A. Peasant said...

so they must have plenty of what they need by now after a couple decades.

INCOMING!!!!!!! said...

Oh yes and they know how to use it with our help.

legal mumbo jumbo

Disclaimer: The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.

Fair Use: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.