The Chinese regime launched a new spy satellite on March 29 (03:17 UTC), claiming it will be used for civilian purposes. According to NASA SpaceFlight, the Ziyuan-3 is a high-resolution remote sensing satellite.
To understand the nature of this satellite launch, we need to look back at earlier launches of China’s Ziyuan satellites.
When it launched its Ziyuan-2 satellite on Sept. 1, 2001, Bill Gertz of The Washington Times reported that the Chinese regime was disguising it as a civilian earth monitoring system. In actuality, he reported, it was a reconnaissance satellite which was used to target U.S. forces operating in the region.
Das 2001 satellite was also launched from the Taiyuan Satellite Launching Center in Shanxi Province, and Chinese authorities made the same claims about its use as they are now with the current satellite. Chinese authorities said in 2001, according to Gertz, that its uses would include “territorial surveying, city planning, crop yield assessment, disaster monitoring and space science experimentation.”
An unnamed official said otherwise, aber. Gertz reported, “An official familiar with intelligence reports on the launch said it is ‘a photoreconnaissance satellite used exclusively for military purposes.’” The official added, “Contrary to officially announced civilian missions, this spacecraft is actually a high-resolution imagery satellite that is producing images of military targets in the areas surrounding China.”
Read MoreChina’s Secret Space Weapons Have the Pentagon Worried
NASA SpaceFlight reported that the ZiYuan-1 program is focused on Earth resources, and “appears to have two distinct military and civil branches.” Its ZiYuan-2 program “is likely used for aerial surveillance operated by the People’s Liberation Army.” The new ZiYuan-3 program, Es sagt aus, is for stereo mapping and “will be operated by the State Bureau of Surveying and Mapping.”
The line the Chinese regime is using for the new ZiYuan-3 program is almost the same as it used for the ZiYuan-2 satellites that Gertz exposed. The Indian Express reported the satellite is for “land resource surveys, natural disaster prevention, agricultural development, water resources management and urban planning, among other tasks.”

Lesen Sie den ganzen Artikel hier

A Chinese state-run news outlets, global Times, published a response on May 29 to rumors that China would begin sending nuclear-armed submarines for patrols in the Pacific Ocean. While it notes the Chinese Communist Party (CCP) has made no official announcements on the patrols, it states that it’s time for the People Liberation Army to send “nuclear submarines into the depth of the Pacific Ocean for regular patrols.”
The report argues that the CCP has a “no first use” policy on nuclear weapons, and because of this, its nuclear ambitions are benign. The problem is that China’s “no first use” policy is little more than a widely-parroted lie.
“With regard to ‘no first use,’ a careful look at the Chinese wording of China’s ‘no first use’ policy reveals that it commits them to nothing,” stated Mark Schneider, a senior analyst with the National Institute for Public Policy, during a congressional hearing in March 2012.
While the CCP’s policy suggests it would not use nuclear weapons unless another country used them first, its actual policy is that it could use nuclear weapons to counter regular military attacks as well.
Schneider noted a report from Kyodo News Agency, which obtained classified Chinese military documents stating China “will adjust the nuclear threat policy if a nuclear missile-possessing country carries out a series of air strikes against key strategic targets in our country with absolutely superior conventional weapons …”
Read MoreBeware the ‘Little White Rabbit’ of China’s Military
He also notes that in 2000, the CCP “adopted a nuclear doctrine which allowed for ‘a preemptive strike strategy,’” which allows it to use “its tactical nuclear weapons in regional wars if necessary.”
The use of pre-emptive strikes is still a key element in Chinese military writings, and as Michael Pillsbury notes in his book, “The Hundred-Year Marathon,” this concept is at the heart of its “Assassin’s Mace” strategy, which the CCP has designed to defeat technologically superior opponents such as the United States. The strategy includes the use of high altitude EMP (HEMP) attacks, which would leverage the EMP field generated by nuclear weapons to destroy communication and control systems of a targeted country.

Lesen Sie den ganzen Artikel hier

This news summary was originally dispatched as part of Epoch Times China email newsletters. Abonnieren Sie den Newsletter per E-Mail Ihre in der "China D-kurze Füllung” unter diesem Artikel box, or sign up here.
One of the most important developments in recent history for China’s military took place last month, and it was easy to miss.
Die Kommunistische Partei Chinas (CCP) ordered its military to abandon its business ventures over the next three years. The order applies to the People’s Liberation Army and the People’s Armed Police.
Those who follow Epoch Times reporting know the implications of this run deep. As my colleague Matthew Robertson pointed out, this will notably close the military-run hospitals which carry out the CCP’s forced organ transplants of prisoners of consciencemost markedly Falun Gong practitioners.
Robertson profiled the operations of one of these hospitals, Tianjin First Central, in an investigative piece in February, and noted “Epoch Times found sufficient evidence to throw into great doubt, if not demolish entirely, the official narrative of organ sourcing in China. This is simply due to the number of transplants: they are far too high.
But the implications of the new order for the Chinese military run deeper still, as the order will very likely also impact the Chinese military’s use of cyberattacks for financial gain.
I’m not talking about the state-sanctioned cyberattacks, but instead the cyberattacks military commanders run to feed business ventures they have ties to, and the cyberattacks individual military hackers carry out to stuff their own pockets.
I mapped out China’s military-industrial complex in a September 2015 Untersuchungsbericht, and noted that until recently the Chinese military was expected to find external ventures to fund its operations.
I also detailed in March the DarkNet marketplaces that Chinese military hackers run to make money on the side. The hackers have been carrying out the state-run cyberattacks on behalf of the Chinese regime, but have also been stealing additional information they can sell personally.
Under the new orders, it’s likely these external ventures will gradually lessen, and we could see a significant drop in Chinese cyberattacks.
Na sicher, this doesn’t mean the state-sponsored cyberattacks will stop. It just means the military-led cyberattacks the Chinese regime doesn’t have a direct hand in could be coming to an end.
This process has actually been underway for some time. Im September 2015, the leader of the Chinese Communist Party, Xi Jinping, announced he would cut 300,000 troops from the Chinese military. This was accompanied by a planned restructuring of the Chinese military.
I reported in November 2015 that there was more to this restructuring than meets the eye. A proposal for the new structure shows that it would move the military units that carry out the cyberattacks out from under strict military control, and put them under joint command between the Central Military Commission and the State Council.
Mit anderen Worten, the restructuring would give the “governmentside of the Chinese regimethe state councilmore oversight over the types of cyberoperations being carried out by the military.
Read MoreAgreement on Cyberattacks Will Not Stop China’s Economic Theft
Im Mai 16, the Chinese regime also deployed “anti-graftsquads to different theater commands and “key military departments,” according to the state-run Global Times. Under the oversight of these 10 anti-graft squads, Es sagt aus, these targeted commands and departments will “for the first time be accountable to top military authorities.
This won’t all happen overnight, aber. The state-run China Daily reported on May 10 that the People’s Liberation Army and People’s Armed Police have started by selecting 17 units to close their commercial activities.
With plans to complete this process within three years, it notes the 17 units are “tasked with exploring effective ways to shut down businesses.

Lesen Sie den ganzen Artikel hier

Diese Nachrichten Analyse wurde ursprünglich als Teil der Epoch Times China E-Mail-Newsletter versandt. Abonnieren Sie den Newsletter per E-Mail Ihre in der "China D-kurze Füllung” unter diesem Artikel box.
Chinesische Telekommunikationsunternehmen Huawei hat kürzlich sein neues P9 Smartphone, und als letzten Wired Schlagzeile Staaten, "Huawei kopiert einfach das iPhone—bis auf die letzte Schraube.”
Vorfälle wie diese sind nichts Neues, wenn es um chinesische Tech-Unternehmen kommt. Epoch Times bemerkte zurück in 2014 dass chinesische Unternehmen Xiaomi hatte sich um das Kopieren von Apple seine gesamte Marke gebaut, bis auf seinen CEO wie Steve Jobs bei der Produkt Veranstaltungen Dressing.
Die jüngste Entwicklung hat, aber, Markieren Sie ein wichtiges Thema.
Noch vor ein paar Monaten, UNS. Führer waren unnachgiebig das chinesische Regime die Nutzung von Cyber-Attacken zu stoppen, um zu stehlen Informationen von US-. Firmen. Dies führte zu der Vereinbarung, von Präsident Barack Obama und der chinesische Führer Xi Jinping angekündigt, auf September. 25, 2015, die Verwendung von Cyber-Attacken für den wirtschaftlichen Diebstahl zu beenden.
Obama erklärte, damals, "Wir haben vereinbart, dass weder die US-. oder die chinesische Regierung durchführen oder wissentlich Cyber-fähigen Diebstahl geistigen Eigentums unterstützen, einschließlich Geschäftsgeheimnisse oder andere vertrauliche Geschäftsinformationen zu kommerziellen Vorteil.”
Es gibt gemischte Berichterstattung über, wie effektiv die Vereinbarung. Ein "60 Minutes” Segment auf Jan. 17 stellte fest, dass der Tag nach der Ankündigung, Chinesische Cyber-Attacken auf US-. Unternehmen weiterhin wie gewohnt. Cyber ​​Firma FireEye behauptete die Vereinbarung die Zahl der chinesischen Cyber-Attacken auf US-verringern tat. Firmen, aber seine Forderungen werden auch von anderen Cyber-Forscher bestritten.
Wie ich in einem Artikel erwähnt um diese Zeit, aber, das Hauptproblem mit der Cyber-Vereinbarung ist, dass es nur Cyber-Attacken verwendet für die wirtschaftliche Diebstahl angesprochen, und es adressiert nur wirtschaftliche Diebstahl durch Cyber ​​durchgeführt.
Mit anderen Worten, die Vereinbarung tut nichts, um Cyber-Attacken verwendet für Nachrichtenbeschaffung stoppen. Das bedeutet, die chinesischen Cyber-Attacken auf das Amt für Personalmanagement, die Stola 21.5 Millionen Datensätze über aktuelle und ehemalige US-. Angestellte des Bundes, das Programm fällt nicht.
Und was genauso wichtig ist, die Vereinbarung hat nichts chinesischen Wirtschafts Diebstahl mit anderen Methoden als cyberespionage zu stoppen.
Der letzte Teil ist wichtig,. Der Teil, der oft in China die Nutzung von Cyber-Attacken für den wirtschaftlichen Diebstahl übersehen, Cyber ​​ist, dass nur eines von vielen Werkzeugen ist das chinesische Regime nutzt für den Diebstahl von Informationen, und alle seine Werkzeuge wiederum nur Erweiterungen eines Systems wird durch die chinesische Politik gerichtet.
Das chinesische Regime hat immer noch einen großen Fokus auf mit herkömmlichen Spione Informationen zu stehlen. Im Verlauf von drei Wochen im April, gab es vier Fälle von angeblichen chinesischen Spione in die Vereinigten Staaten Targeting.
Auch in diesem Monat, es hat bereits einen Fall eines einzelnen gewesen leitenden was Spionage im Auftrag des chinesischen Regimes ähnelt. Ein ehemaliger US-. Armee Auftragnehmer wurde durch Verschleierung für Liegen auf dem Sicherheitsüberprüfung Form zu sechs Monaten Hausarrest verurteilt, dass er früher in der chinesischen Volksbefreiungsarmee gedient. Der einzelne hatte auch Sicherheitsprotokolle verletzt, indem ein USB-Laufwerk an einen Computer in der Armee Netzwerk verbinden, dann versucht, seine Spuren zu verwischen.
MEHR:Kanada sagt Huawei Mitarbeiter Spies May Be, Lehnt Immigration Anwendungen
Der Fakt ist, die Kommunistische Partei Chinas hat eine große Systeminformationen aus den Vereinigten Staaten für den Diebstahl und von US-. Unternehmen.
Die anderen Methoden umfassen die Verwendung von ausgedehnten Netzwerk Schüler Spione, die Verwendung von wissenschaftlichen Forschungspartnerschaften, die Verwendung von Frontorganisationen einschließlich chinesischen Heimatstadt Verbände, die Nutzung von Geschäftspartnerschaften rund um Forschung, und die Verwendung von ausländischen Experten zu zentralen Themen einladen, China zu besuchen und entweder vorhanden oder kooperieren bei Forschung rund um ihr Know-how.
Dann, gibt es chinesische "graue Märkte,” wo chinesische Fabriken, die tun ausländische Waren einfach zusätzliche Produktionsläufe herstellen, so können sie die Produkte selbst herstellen und verkaufen.
die Cyber-Attacken stoppen wird das Problem nicht zu stoppen. Cyber ​​sicherlich macht es einfacher für das chinesische Regime Produkte und Designs zu stehlen, aber wieder, sie haben viele andere Werkzeuge zur Verfügung,.
Denken Sie an Cyber ​​als nur ein Kopf eines hydra. Sie können den Kopf abgeschnitten, aber zwei Köpfe an ihrer Stelle wachsen zurück. Mit dem chinesischen Regime, wenn Cyber ​​wird aus der Gleichung der wirtschaftlichen Diebstahl entfernt, es wird einfach finden andere, effektiveres Mittel.
Noch, ebenso wie die mythische hydra, die Möglichkeit, dieses System zu stoppen, ist an den Anhängseln zu stoppen geschwungen, und fahren Sie geradeaus für das Herz—und für das chinesische Regime, das Herz dieser Programme sind die internen Richtlinien und Einrichtungen für den Diebstahl und das Kopieren von ausländischer Technologie.
MEHR:Mit Barrage der chinesischen Spies Konfrontiert, US erweitert Regeln für nationale Sicherheit Cases
Seine Politik für wirtschaftliche Diebstahl umfassen Projekt 863, das Torch-Programm, das 973 Programm, und das 211 Programm. Es hat auch ein ausgedehntes System von Zentren entwickelt gestohlene Technologie Reverse-Engineering, als Chinas nationale Zentren für Technologietransfer oder nationale Demonstration Organisationen bekannt.
Mit den jüngsten US-. Bemühungen des chinesischen Regimes Einsatz wirtschaftlicher Diebstahl zu stoppen, Die Frage sollte nicht sein, ob die Cyber-Attacken gestoppt. Die Fragen sollten sein, ob die chinesische Regierung ihre Politik beendet, die wirtschaftliche Diebstahl führen, und ob sie geschlossen ihre Einrichtungen, um das Kopieren gestohlene Technologie gewidmet. Die Antwort bisher auf diese beiden Fragen ist ein einfaches "nein.”

Lesen Sie den ganzen Artikel hier

Das chinesische Regime verschlüsselten Kampfjets im Mai 10 eine US-zu jagen. Marineschiff in einer Region des Südchinesischen Meer über 500 Meilen südlich vom chinesischen Festland.
Die Vereinigten Staaten setzt ihre "Freiheit der Schifffahrt” Übungen in der Region, die verschiedenen Ländern behaupten Teilen, und die China behauptet, in seiner Gesamtheit.
Die USS William P. Lawrence, ein Lenkwaffenzerstörer, innerhalb von 12 nautischen Meilen des Yongshu Jiao bestanden, Das ist in der Spratly-Inselkette. Laut Reuters, das chinesische Regime reagierte mit zwei Kampfjets kriechen und drei Kriegsschiffe, die im Schatten der US-. Schiff und sagte, es zu verlassen.
China wandelte das Riff in eine künstliche Insel in einem sehr umstrittenen Schritt in 2014, und Satellitenbilder in September. 2015 gezeigt hatte das chinesische Regime den Aufbau fortschrittlicher militärischer Einrichtungen auf der künstlichen Insel gestartet, einschließlich hoch entwickelte Radar.
Laut The Diplomat, das chinesische Regime hatte auch eine Start- und Landebahn auf der künstlichen Insel in der Nähe gebaut 10,000 Meter lang. Auf Jan. 2, es führte seine erste Landung auf dem neu gebauten airstrip.
Dies ist nicht das erste Mal, das chinesische Regime Jets hat verschlüsselten ausländischen Schiffen oder Flugzeugen in der angefochtenen Region zu jagen. Im 2013, bald nach China schuf eine weitgehend unerkannt Luftverteidigungszone in der umstrittenen East China Sea, es begann Strahlen kriechen US-zu jagen. und japanische Flugzeuge, die durch die Region.
MEHR:Mit Barrage der chinesischen Spies Konfrontiert, US erweitert Regeln für nationale Sicherheit Cases
Das vielleicht, aber, werden das erste Mal, hat das chinesische Regime Jets Rührei in einer Region so weit südlich von dem chinesischen Festland ausländische Schiffe zu jagen.
Das chinesische Regime begann erst vor kurzem Jets in der South China Sea bereitstellen. Im Februar, es begann Jets auf Woody Island bereitstellen, Teil der Paracel-Inselkette näher an Vietnam und Hainan.
Die Jets verwendet es in der jüngsten Einbruch, aber, waren wahrscheinlich die beiden J-11-Kampfjets es Anfang April Woody Island im Einsatz.

Lesen Sie den ganzen Artikel hier

The Chinese regime went ahead with tests of its newest ballistic missile on April 12, which can allegedly carry up to 10 nuclear warheads to any part of the United States.
It conducted the tests while also expressing discord over an upcoming decision from an international arbitration court about China’s claims to the South China Sea. The case, brought to court by the Philippines, could discredit China’s claims to the region.
Unnamed Pentagon officials revealed details on the missile test to the Washington Free Beacon. They allegedly monitored the flights of two missiles, which appeared on military satellites and regional sensors.
The officials did not detail the location of the test, but the Free Beacon notes in the April 19 article that previous tests were carried out from the Wuzhai Missile and Space Test Center in central China.
It also notes the tests came just three days before Defense Secretary Ash Carter visited a U.S. aircraft carrier in the South China Sea, and around the same time that a high-ranking Chinese general “made an unusual visit to a disputed South China Sea island.
According to Dr. Bernard D. Cole, who teaches Sino-American Relations and Maritime Strategy at the National War College, the test was likely planned long in advance
“The DF-41 has been in development for at least 15 Jahre, probably longer, so this is just the end of a very long development cycle,” he said in a phone interview.
The Free Beacon also noted that Kanwa Asian Defense reported last month that China’s new intercontinental ballistic missile was in its final testing phase, and they were expected to deply it near Xinyang in Henan province, in central China.
Cole said that China having a nuclear weapon that can strike the United States may not have a significant impact on how the United States deals with China, but it could affect the behavior of the Chinese regime.
“I don’t know that it’s going to make the U.S. approach different, if at all, but it will give China more confidence as they deal with issues,” Cole said.
Er fügte hinzu, “It will build a confidence in their diplomacy and their miltiary status.
Another factor is that the Chinese regime has been mulling over plans to change its policy on nuclear weapons from “survivabilityto a hair-trigger status that has its missiles ready to launch at any moment.
The Union of Concerned Scientists noted China’s potential shift in policy in a Feb. 16 Bericht. It said China may be moving “toward a policy of launch-on-warning and hair-trigger alert,” and noted the United States also uses a hair-trigger alert.
“Such a change would dramatically increase the risk of a nuclear exchange or accidenta dangerous shift that the United States could help avert,” it stated.
MEHR:Second Chinese Spy Case In a Week: Tried Exporting Materials for China Missile Program
According to Cole, the “worse case situationwith China’s new missiles and its alleged policy changes woudl be if policies of mutually-assured destruction were to emerge between China and the United States, similar to what existed between the United State and the Soviets during the Cold War.
Er sagte, aber, that there seems to be no indication that things are moving in that direction, yet noted “it’s possible.
With the latest test in particular, Cole said, “it’s an important development, but I don’t think it’s a crucial one.

Lesen Sie den ganzen Artikel hier

As the Chinese National People’s Congress met in Beijing this week, one announcement was the planned defense budget for 2016. Contrary to some rumors, China’s defense budget will rise by “only” 7.6 Prozent 2016, only the second time in 20 years that the growth has been in single digits. At 954 billion renminbi, or approximately $147 Milliarde, China’s defense budget is second only to that of the United States.
The Chinese defense budget figure has long been a source of controversy, as it is believed to understate actual Chinese defense spending. Part of this is likely due to different accounting methods, as well as a tendency to limit transparency.
Dennoch, it is clear that China is going to continue to allocate substantial resources to its defense modernization efforts, even as the Chinese economy shows signs of slowing.
The Chinese defense budget announcement comes on the heels of announcements of three major reform pathways.
MEHR:China’s Military Reform: Politics by Another NameUS Needs to Form an Asian Alliance to Stop Chinese Hegemony, Says Top Expert
Im Dezember, the Chinese announced the establishment of three new services: a separate ground forces command; the elevation of the Second Artillery to the status of a service; and the creation of a separate service to control China’s space, electronic warfare, and computer network attack forces. Subsequently, the Central Military Commission was reorganized from four General Departments to 15 departments, commissions, und Büros.
Endlich, the People’s Liberation Army (PLA) has announced a transition from seven military regions to five theater or war zone joint commands. Coupled with the announcement of a 300,000-man cut in the size of the People’s Liberation Army made in September 2015, the PLA is clearly undergoing a massive, fundamental overhaul.
It is not clear why the Chinese defense budget increase was scaled back, although some analysts think it may reflect China’s slowing economy. It is worth noting, aber, that the increase in the People’s Liberation Army budget is still substantially higher than the growth of any Western military.
MEHR:China’s Economy Is Just ‘One KilometerAway From a CliffChina Continues Vast Spending on Domestic Security
It also remains to be seen how the growth in the Chinese external security budget (i.e., for the PLA) compares with that for internal security, including the People’s Armed Police (PAP) and provincial-level public security forces. For the past several years, the internal security budget has grown more quickly than the defense budget, to the point where overall spending on internal security may outpace that for external defense.
Dean Cheng is a senior research fellow in The Heritage Foundation’s Asian Studies Center. Copyright The Daily Signal. This article was originally published on The Daily Signal.

Lesen Sie den ganzen Artikel hier

Diese Nachrichten Analyse wurde ursprünglich als Teil der Epoch Times China E-Mail-Newsletter versandt. Abonnieren Sie den Newsletter per E-Mail Ihre in der "China D-kurze Füllung” unter diesem Artikel box.
All the saber rattling in the world won’t do a thing if China is able to successfully implement its anti-access strategy in the South China Sea. China’s deployment of the strategy is likely nearing completion.
Defense analysts have warned that China is working on a strategy to lock the United States out of the South and East China Sea with what they call anti-access/area denial (A2/AD) systems and capabilities.
This would give China control of the Asia-Pacific region, und, unter anderem, make it difficult for the United States to intervene if the Chinese Communist Party (CCP) were to invade Taiwan.
Dean Cheng, a leading expert on the Chinese military, warned in a July 2014 report for The Heritage Foundation that the Chinese military was “comprehensively modernizingforces, and incorporating A2/AD systems ranging from anti-ship missiles to political warfare methods, including legal, public opinion, and psychological warfare.
The world has now watched as China deployed these weapons and capabilities, over the last couple years.
China has recently deployed jets, Radar, and anti-air missiles on islands in the South China Sea. It may also be building a new helicopter base for anti-submarine warfare, along with refueling stops scattered through the region. Chinese defense analysts are now calling for Chinese ships to ram and fire warning shots at U.S. ships passing through the region. Others are calling for the CCP to deploy anti-ship missiles and other advanced weapons.
When the CCP’s weapons and strategies used in the South China Sea are viewed as a whole, it now has systems to attack targets in the air, sea, and undersea. And it has accompanied this with a near constant barrage of propaganda and legal claims meant to change global perceptions on its actions.
MEHR:CHINA SECURITY: Clash Over South China Sea Is Reaching Boiling PointChina Starts Building Military Base in North Africa
While the situation has appeared chaotic, the CCP’s strategy has actually moved along steadily.
The CCP announced in July 2015 that it was completing operations to build islands in the South China Sea. Epoch Times reported accurately that the CCP was merely moving to “phase 2in its operations.
“It means they’re moving onto phase 2, which means the construction of facilities and capabilities on these islands,” said Mira Rapp-Hooper, director of the Asia Maritime Transparency Initiative at the Center for Strategic & Internationale Studien, damals.
The CCP is now well into that second phase, and when that’s complete, phase 3 will likely follow.
And that third phase is likely what defense experts have been warning about for years: a phase where the CCP acts on its threats, and starts attacking foreign military ships and jets passing through the region.
This next phase may not be far off. Am Februar. 28, South China Morning Post reported, “China’s military is prepared ‘to defend sovereigntyin the South China Sea.
It quoted People’s Liberation Army General Wang Jiaocheng saying “No country will be allowed to use any excuse or action to threaten China’s sovereignty and safety,” and added, “the foremost mission is to safeguard rights and interests in the South China Sea.
MEHR:You’re on File: Exclusive Inside Story on China’s Database of AmericansInvestigative Report: Ein Krankenhaus Built for Murder
From here, whether the CCP succeeds in its plan hinges on whether or not the United States chooses to back downand it doesn’t appear the U.S. military plans on doing that anytime soon.
Commander of U.S. Pacific Command, Adm. Harry Harris, recently said the CCP is “changing the operational landscape in the South China Sea,” and said the United States will continue its patrols of the region as it always has, regardless of threats or claims from the CCP.
“Short of war, I’m aware of the threat. I’ll pay attention to the threat,” er sagte. “But that is not going to prevent us from flying, sailing or operating wherever international law allows.

Lesen Sie den ganzen Artikel hier

An insider in China has revealed to the Epoch Times that he helped build a database that is now being used to handle Americanspersonal information stolen in cyberattacks.
The FBI revealed on June 4, 2015, that a cyberattack, allegedly from China, stole personal information on close to 21.5 Millionen US-. federal employees after breaking into the computer files of the Office of Personnel Management (OPM). Subsequent Chinese cyberattacks have also targeted personal data on Americans, including the February 2015 breach of Anthem that stole close to 80 million records.
Speculation began soon after on how the Chinese regime could use the data. A July 2015 report from the Congressional Research Service states “experts in and out of governmentsuspect the Chinese regime may be building a database on federal employees it could use for espionage.
With a database like thisthe Chinese regime can have a systematic roadmap of Americans and their connections, and information it can use to blackmail government employees, recruit insiders as spies, and monitor people who speak out against its policies.
FBI Director James Comey said in a Sept. 10, 2015, hearing on cybersecurity, “There is a significant counterintelligence threat that’s associatedwith a nationstate getting hold of the data.
According to the insider, die Kommunistische Partei Chinas (CCP) has built the database needed to make use of the massive trove of stolen data. He said that to create the spy database, the CCP brought in a small group of independent software developers from the United States, who worked alongside Chinese security branches to implement the system.
The source requested to have his name withheld, in fear of reprisal from the CCP. Other sources confirmed this man’s identity, and said that he would have access to the kind of information he gave the Epoch Times. In der Vergangenheit, he has provided the Epoch Times with significant information about confidential matters in China that has proven accurate.
(Illustration by Jens Almroth/Epoch Times)
The new system is part of a broader shift in the Chinese regime’s efforts in espionage and social control. With the database, the CCP is now keeping tabs on foreigners in much the same way it has kept tabs on its own citizens, their connections, and their political thoughts.
Chinese spy agencies finished building the system around July 2013. März 2014, Chinese hackers originally tried, and failed, to breach OPM.
The source said one of the leading organizations involved in the project was the 61 Research Institute, which is one of four known research institutes under the Third Department of the General Staff Departmentthe branch of the People’s Liberation Army in charge of its military hackers.
The Epoch Times exposed in a previous investigation that the 61 Research Institute is one of the leading organizations behind the CCP’s state-run cyberattacks.
The organization is led by Wang Jianxin, a son of Wang Zheng, who helped establish the CCP’s signals intelligence operations under Mao Zedong.
While the 61 Research Institute’s role in the project ties it to global cyberespionage, the source said many other Chinese domestic security branches were also involved in building the systemincluding various branches of the police and about six branches of the secret police.
The functions of the spy system, and the departments involved, suggest it will be used not only as a database on foreigners, but also as a system to better monitor Chinese people. The source noted that one of its functions will be to gather information on individuals from all available sources in China, and outside China, that can be used for criminal trials.
“Our intelligence sources corroborate this information,” said Casey Fleming, CEO of BLACKOPS Partners Corporation, which provides cybersecurity intelligence, Strategie, and risk reduction to some of the largest companies in the world.
“Our ongoing intelligence gathering shows indication that this database has been in process at least over the last three yearscommanded at the highest levels of the Chinese government,” he said in a phone interview.
Big Data Espionage
According to the source, the software used for the database was originally a big data analytics program for smart city measurements, and the CCP altered it for its own uses.

Chinese hackers stole personal information on approxiamtely 21.5 million Americans from the computer files of the U.S. government’s Office of Personnel Management. (Chinamil.com.cn)
What made the software attractive was its powerful functions for gathering information, and showing relationships between data. The source said it was also scalableenough to hold credentials on every Chinese citizen, and to display everything from their personal data, to data on their family members, Verhältnis, and personal background.

The spy database displays data in nodes, which can be displayed by themselves, in relation to other data or events.
The system is capable of ingesting and sorting large amounts of data. The source noted the spy database is even better at this than some open source programs designed for the purpose.
A security service using the system could conduct deep data mining on personal files in the system, to show how individuals relate to one another, even over set timeframes.
The system can also be used to collect data on individuals. The source said it can gather information on people from Chinese security offices, from its own internal database, and from sources abroad, outside the Chinese firewall.
According to the source, getting personal data on foreignersincluding Americansis fairly easy. He said it’s often not necessary for the Chinese regime to use cyberattacks to steal sensitive information.
He said U.S. Banken, beispielsweise, often hire many people from other countries, and many tech industries do the same. Many of these individuals can be given trusted positions within these companies, and he said it’s not uncommon for some of these individuals to take data out of the companies, and sell it.
It’s not difficult, er sagte, to create a fairly deep profile on a person using data stolen from just a handful of sources.
The Chinese spy system he helped build, er sagte, takes this information and organizes it in a form that departments of the Chinese regime can then usewhether it be for industrial espionage, or other purposes.
Fleming said that although the most visible Chinese cyberattacks feeding

Lesen Sie den ganzen Artikel hier

Diese Nachrichten Analyse wurde ursprünglich als Teil der Epoch Times China E-Mail-Newsletter versandt. Abonnieren Sie den Newsletter per E-Mail Ihre in der "China D-kurze Füllung” unter diesem Artikel box.
While news that China deployed anti-aircraft missiles in the South China Sea made headlines over the past week, the missiles are just part of a broader shift that will likely take the conflict to a new level.
The changes began on Jan. 30, when the USS Curtis Wilbur, a destroyer with the U.S. Marine, passed within 12 nautical miles of Triton Island in the Paracel Island chain in the South China Sea.
It was part of a “freedom of navigationmission, and was supported by Taiwan and Vietnam, which both lay claim to Triton Island. China, andererseits, which also claims the island, was not happy.
State-run news sources within China began trumpeting news about U.S. aggression, and claims that the United States was trying to establish “hegemonyin the South China Sea.
I explained the irony of the Chinese narrative in a previous piecenoting that the situation is the opposite. China is literally trying to establish hegemony over the region, while the United States is trying to maintain standards of free transit through the waters which are critical to international trade.
Noch, regardless of intentions, the Chinese regime called for a heightened military response against the United States and its alliesand this may bring tensions in the South China Sea to a boiling point.
Satellite imagery from Feb. 14 showed that China deployed anti-air missile systems (surface-to-air missiles, or SAMs) on Woody Island in the Paracel Island chain.
The Chinese regime claimed the missiles had been there for years, but if this was true, the Chinese military had kept the missiles hidden. Satellite images show the missiles were brought out sometime between Feb. 3 and Feb. 14. Previous reports say China began weaponizing its man-made islands around May 2015.
While the missiles took center-stage in global reporting, aber, there were several other developments of similar weight.
China may be building a new helicopter base for anti-submarine warfare (ASW), according to a report from USNI News, a news source of the U.S. Naval Institute. Defense analysts have previously noted that submarines would be a game-changes for the United States, if there were a war with China.
The new anti-submarine base “could signal a step-up in China’s ASW capabilities across the South China Sea,” states a report from Victor Robert Lee of The Diplomat.
“A network of helicopter bases and refueling stops scattered across the South China Sea, using no more than the bases China is already known to be building, would make almost any coordinate in the sea reachable,” Lee states.
People’s Daily, one of the main mouthpieces of the Chinese regime, then followed with a commentary saying China must “teach the US a lessonif the United States continues its freedom of navigation operations in the South China Sea.
The commentary said Chinese forces should fire warning shots and ram U.S. ships.
Chinese news outlets are now reporting that the Chinese regime may deploy anti-ship missiles, and other weapons in the South China Sea.
Li Jie, senior researcher at the PLA Naval Military Studies ­Research Institute, told the South China Morning Post that China would deploy more advanced weapons if the United States “pushed too hard.
Facing the rise in tensions with China, the United States is now looking to expand a key naval protocol for safety of ships meeting at sea, called the Code for Unplanned Encounters at Sea.
The proposed changes would edit rules to cover non-military ships. It was outlined by Vice Admiral Joseph Aucoin, the commander of the Japan-based U.S. Seventh Fleet, according to The Diplomat.
MEHR:Clone of America’s Top Jet Spotted on Chinese AirfieldInvestigative Report: Ein Krankenhaus Built for Murder
One of the key reasons for the considered changes, according to The Diplomat, is that the Chinese regime is deploying new, large coast guard ships “painted white rather than Navy grey.China has been using coast guard and fishing boats as part of its military strategy in the region.
Other nations are also upping their game to challenge China’s claims. The United States is urging Australia to begin its own freedom of navigation operations, Vietnam is building up its military, troops in the Philippines are preparing for the “worst-casescenario of a dispute with China, and Japan is considering starting its own naval patrols.
The question now is how hard is China willing to push back, and how will other nations undo China’s actions to build military structures in its push to control transit in the region.

Lesen Sie den ganzen Artikel hier

PEARL HARBOR, Hawaii—Die US-. Pacific Fleet is shrinking even as the U.S. and its allies are facing challenges posed by China’s growing military power.
UNS. Navy officials say the more advanced ships of today make up for the decline in numbers. But the Navy has also had to lengthen deployments and postpone maintenance to maintain its presence with fewer ships.
Peter Jennings, an expert at the Australian Strategic Policy Institute think tank, said the issue in peacetime is whether there are enough American vessels to reassure friends and allies.
“I think this is emerging as a serious long-term problem,” er sagte.
The Pacific Fleet currently has 182 vessels, including combat ships like aircraft carriers as well as auxiliary and logistics vessels, said spokesman Cmdr. Clay Doss. That compares to 192 nearly two decades ago.
The Chinese People’s Liberation Army Navy has more than 300 surface ships, U-Boote, amphibious ships and patrol craft, according to the Pentagon’s Asia-Pacific Maritime Security Strategy report released in August.
MEHR:How Do Millennials View Foreign Policy?CHINA SECURITY: China Is Developing More Effective Ways to Hide Nukes
This all comes as China has grown more aggressive in asserting claims to islands also claimed by U.S. allies, including the Philippines in the South China Sea and Japan in the East China Sea.
China sees the U.S. military presence in Asia as an attempt to contain it, said Denny Roy, a senior fellow at the East-West Center in Honolulu. Beijing sees itself as returning to its rightful and historical role as the pre-eminent cultural and political power in the region, er sagte.
Since December 2013, China has built what the U.S. estimates to be 3,000 acres of artificial islands in disputed areas of the South China Sea using sand dredged from the ocean floor.
China has said the islands are meant to help ships, fishermen and disaster relief.
MEHR:CHINA SECURITY: The Inner Workings of Chinese Economic EspionageCHINA SECURITY: China’s Purchase of Russian Su-35 Jets Is a Sign of Failed Development
Questions about whether the Pacific Fleet has enough resources are more of a reflection of regional anxieties than the Navy’s actual capability, said its commander, Adm. Scott Swift.
“I’m very comfortable with the resources I have,” Swift said.
He pointed to the USS Benfold, a guided missile destroyer upgraded with new ballistic missile defenses, as well as three new stealth destroyers, the DDG-1000, in the pipeline, as examples.
One consequence of a smaller fleet has been more time at sea. Retired Adm. Zap Zlatoper, who commanded the Pacific Fleet in the 1990s, said deployments longer than six months made it harder for the Navy to retain sailors. Ships now deploy for an average of seven to nine months, though the Navy plans to lower this to seven.
MEHR:CHINA SECURITY: Abandoned US Weapon Project Now Being Developed by Chinese MilitaryCHINA SECURITY: Are China’s New ‘Floating IslandsBeing Built for the Indian Ocean?
Ship conditions have also suffered. The USS Essex left an exercise with Australia early in 2011 and skipped another with Thailand the following year because it developed mechanical problems after delaying maintenance to stay at sea.
Bryan Clark, a senior fellow at the Center for Strategic and Budgetary Assessments, a Washington think tank, said these are signs the status quo is unsustainable.
In a November report, Clark outlined alternatives: build more ships, though this would require money Congress may not give the Navy, or deploy less, though the Pentagon has been reluctant to accept less of an overseas presence.
The other choices: keep more ships at overseas bases where they would be closer to where they operate or mix up how ships deploy. One example would be to send fewer escorts with an aircraft carrier.

Lesen Sie den ganzen Artikel hier

A major command structure reform is coming to the Chinese People’s Liberation Army (PLA) bis Ende 2015, unnamed sources told the Hong Kong-based South China Morning Post. The reform, known to be in the works for the past several months, is intended to orient the PLA towards becoming a more professional force in the mold of Western militaries, while at the same time maintaining and consolidating the Communist Party’s central political control over it.
These institutional changes, made as Chinese leader Xi Jinping strengthens his personal authority, represent the latest round of the often-turbulent Party-Army dynamic.
The restructuring involves personnel changes, cuts to the force size, and highlights the important roles of the PLA’s air and naval forces, which have historically taken a back seat to the ground forces.
Two sources told the South China Morning Post that the seven “obsoletemilitary regions would be replaced by five regional commandsNorth, Süd, Osten, West, and a central combat zone, which one of the sources said would likely be located in Beijing.
“The head office of the central combat zone is likely to be in Beijing, because the capital is also China’s administrative and military nerve centre,” sagte die Quelle.
MEHR:Why Is China Really Cutting 300,000 Troops?Who Will Xi Jinping Put in Charge of China’s Military?
In a commentary piece published recently in a PLA journal, the existing seven-command system was criticized as outdated. It was said to be overly centralized and to pose a challenge to Party control. According to the new setup, the Central Military Commission, the agency by which the Communist Party controls the Chinese military, would wield more direct authority. New commissions and departments have already been created to this end, South China Morning Post said.
Historisch, the Party and PLA have had a complicated, sometimes cut-throat relationship due to the former’s demand for political dominance. Founder of the communist state Mao Zedong, known for his saying that the “Party controls the gun,” purged the armed forces multiple times, including officers who had followed his earlier directives.
MEHR:CHINA SECURITY: China Reins in Its Hacker ArmyCHINA SECURITY: China’s Purchase of Russian Su-35 Jets Is a Sign of Failed Development
Später, under former Party leader Jiang Zemin, the PLA and its staff engaged in massive corruption as generals such as Xu Caihou and Guo Boxiong, who had personal allegiances to Jiang Zemin, abused their power. These and other officers have been purged en masse in the two years since Xi Jinping took power.
Xi’s reform, obwohl, is also likely to involve personal ties. Im Oktober, sources told South China Morning Post that the leader’s ally Gen. Zhang Youxia was a likely candidate for vice-chairman of the Central Military Commission. Xi and Zhang’s fathers were fellow officers in the communist forces during the Chinese civil war that brought the Party to power in the 1940s.

Lesen Sie den ganzen Artikel hier

Diese Nachrichten Analyse wurde ursprünglich als Teil der Epoch Times China E-Mail-Newsletter versandt. Abonnieren Sie den Newsletter per E-Mail Ihre in der "China D-kurze Füllung” unter diesem Artikel box.
Imagine for a moment how the world would react if the United States spent $2 billion to purchase 16 Eurofighter Typhoon fighter jets. It would likely draw immediate speculation that U.S. development of the F-35 and F-22 jets had somehow failed.
This speculation should also hold true for a very real arms purchase that happened on Nov. 19, when the Chinese regime announced its $2 billion purchase of 24 Russian Su-35 fighter jets, beim $83 million each.
An der Oberfläche, the purchase seems a bit odd. The Su-35 is a 4.5 generation fighter jet. The Chinese regime already has several 4.5 generation fighter jets it can build domestically (the JF-17, the JH-7, the J-10, and the J-11), and it’s currently developing two fifth-generation jets (the J-20 and the J-31).
The purchase should raise the question of why a country would purchase foreign jets, when it could allegedly build more powerful jets by itself.
The simple answer is that Chinese fighter jets have more problems than they’d like the world to think.
As a bit of background, the Chinese regime’s interests in the Su-35 aren’t new. Russia started negotiating in 2011 to sell the jets to China, and the negotiations were stalled for a while since the Chinese Communist Party (CCP) wanted the jets to be built in Chinese factories.
I reported in 2013 that history is repeating itself with the CCP’s interests in the Su-35. It mirrors what happened with the Chinese programs to develop the J-10 fighter jet.
The CCP began developing the J-10 in the 1980s, put out a prototype in the 1990s, and then in 1992 it purchased 50 Su-27s from Russia. The CCP’s purchase of the Russian jets was viewed as a sign that the J-10 programs were failing.
Bis heute, Russia remains the main supplier of China’s fighter jets and bombers, and many domestically-built Chinese planes still rely on Russian parts.
It wasn’t until 2006 that the CCP completed the J-10, and to this day, the jet relies on Russian partsincluding Russian engines.
The CCP’s development of jet engines has been a blunder of its own. It announced in 2010 that it would start building its own jet enginesusing the WS-10A, which was still a knock-off of a Russian engine. Just one year later, aber, it went back to ordering Russian jet engines.
In this same light, the CCP’s purchase of the Su-35 jets could mean that it lacks faith in its own production of modern-generation fighter jets, including its J-20.
Behind the rhetoric, there are some serious problems in the CCP’s state-run jet companies. A manager at Shenyang Aircraft Corp. revealed some of these problems to Epoch Times in an interview last year, and exposed rampant corruption and faulty production methods.
The manager said four company executives were embezzling close to 100 Millionen Yuan ($16 Million) a year. The manager claimed that key components in the J-8 fighter jet were built by temporary workers from eight factoriesand noted these companies lacked training, certifications, and work authorization.
The manager also revealed there are hidden problems in the Chinese jets, which requires Shenyang Aircraft Corp. to have specialized repair teams on standby whenever the CCP’s air force operates its jets.
China Central Television (CCTV), one of the main mouthpieces of the CCP, aired some of these shortcomings in a recent video. It showed precision parts of the J-15 fighter jet being manually polished at Shenyang Aircraft Corp.
Chinese netizens were quick to poke fun at the broadcast, pointing out the components being hand polished are controlled at three micron precision, or about 0.0001 of an inch. One user wrote, “Nowadays advanced [computer numerical control] can completely achieve precision of two micron. The technician in the report would have to be a superman to be as precise as three micron.
Ebenfalls, while most news outlets were quick to trump up the Chinese purchase of the Su-35 jets as a kind of power shift that could challenge the U.S. fighter jets, they won’t do much to change the balance of power in the Asia-Pacific region.
The Su-35 is close to the capabilities of the Boeing F/A-18E/F Super Hornet. The United States also has several 4.5 generation fighter jets, including the F-14 Tomcat, F-15 Eagle, and the F-16 Fighting Falcon.
MEHR:CHINA SECURITY: Foreign Manufacturers Behind China’s First Homegrown Passenger PlaneCHINA SECURITY: Abandoned US Weapon Project Now Being Developed by Chinese Military
The planes also don’t give CCP too much of an edge over its neighbors. As far as 4.5 generation fighter jets go, India has the HAL Tejas, South Korea has the FA-50, and Japan has the F-2. India has also provided 12 of its FA-50s to the Philippines.
The other reality is that the Chinese regime’s development of fifth generation fighter jets is on the clock.
Indien, Südkorea, Indonesien, and Japan are all developing fifth-generation fighter jets. India is developing the HAL Advanced Medium Combat Aircraft and the Sukhoi/HAL Fifth Generation Fighter Aircraft. Japan is developing the Mitsubishi ATD-X. Indonesia and South Korea are co-developing the KF-X/IF-X.
All of these programs are expected to be completed by the early-to-mid 2020s. If the CCP’s fifth generation fighter jets stay on track, it expects its J-20 to be operational by 2018 and its J-31 by to be operational by 2020.

Lesen Sie den ganzen Artikel hier

Rumor has it the Chinese regime will move its cyberwarfare units under a single command structure. Unnamed sources told Bloomberg in mid-October that Chinese cyber units from all departments would be moved under a centralized command under the Central Military Commission.
Changes were allegedly discussed during the Chinese Communist Party’s (CCP) Fifth Plenum, attended by more than 350 top CCP officials, where they lay out the new five-year economic plan.
Bloomberg followed with some interesting analysis, but in my opinion, it missed the mark. Als erstes, the Chinese regime already has a command structure for its cyber departments, which on the surfaceand under proposed changesis headed by the Central Military Commission. Zweite, proposals for the new Chinese military structure give a much more complex picture of how its cyber units will be managed.
As things stand now, the CCP’s cyber units are broken into three tiers. The structure, which is already under the Central Military Commission, was detailed in the latest edition of The Science of Military Strategy, published by the top research institute of the People’s Liberation Army (PLA). While the document was released in 2013, details on the cyber structure were only reported in the West in March this year.
At the top of the cyber structure are the specialized PLA military units assigned to attack and defend networks. Next are the specialists in civilian organizationsincluding the the Ministry of State Security and the Ministry of Public Securitythat are “authorized by the military to carry out network warfare operations.The third tier are groups outside the regime, which presumably include nationalistic hackers (often known as “Patriot Hackers”), that can be called on for cyber operations when needed.
The Central Military Commission is technically in charge of these units, but when it comes to actual power within the PLA, things aren’t that simple.
According to the surface structure, the Central Military Commission heads the General Staff Department, which in turn heads the hacker units under its Third Department. In an investigative report in September, aber, Epoch Times revealed that the real power behind the PLA hackers is the 61 Research Department of the Third Department.
Das 61 Research Institute is led by Maj. Gen. Wang Jianxin, son of Wang Zheng who pioneered the CCP’s signals intelligence operations under Mao Zedong. Sources told Epoch Times that while Wang’s department is several tiers below the Central Military Commission, he’s an extremely powerful man.
This is where the new structure comes into play. It ties into plans to restructure the entire PLA, and cut 300,000 troops, announced by CCP leader Xi Jinping in early September.
Shortly after the announcement, South China Morning Post—which has been growing increasingly close to the Chinese regimereleased an infographic showing a proposal for the new structure.
Under the current system, most of the military is controlled by the Central Military Commission, with some power shared with the State Council through its joint influence over the Ministry of National Defense.
With the new structure, aber, a large chunk of military units would be placed under the Ministry of National Defensewhich means the State Council would have more of a hand in their operations.
The State Council is technically the government of China, but it’s still controlled by the CCP.
inzwischen, the unit in charge of the hackersthe General Staff Departmentwould be given command over three other departments: General Political Department, General Logistics Department, and the General Armaments Department.
In an odd knot, control of those same three departments will be shared under the Ministry of National Defense. And oddly, also under the Ministry of National Defense will be some departments with ties to cyberespionage. Among them are the regional defense and research departments, the National Defense University, the Academy of Military Science, and the National University of Defense Technology.
Mit anderen Worten, the military hackers would officially remain under the Central Military Commission, but departments tied to their operations would be jointly controlled by an office managed by both the Central Military Commission and the State Council.
Keep in mind, these are still just proposals. But it appears the changes aren’t meant to consolidate command of the CCP’s hackers. Stattdessen, it looks like the changes are designed to reign in the hackers by giving the State Council some indirect sway over their actions. Several sources have told Epoch Times that the Chinese regime has trouble controlling finances tied to military hackers, and this has caused forms of corruption that the leadership wishes to stem.
The new system would give the State Councilthe highest executive agency in the Chinese state (though of course below the Politburo Standing Committee)—more oversight. This puts the infrastructure for economic theft under the Ministry of Defense, while giving more government oversight over the activities, thus depriving the PLA of some of its autonomy.

Lesen Sie den ganzen Artikel hier

A concept for a “Very Large Floating Structure” mobile sea base is shown in a Chinese promotional video, which was posted online by naval defense industry magazine, Navy Recognition. The mobile base project was recently unveiled at the National Defense Science and Technology Achievements exhibition in Beijing. (YouTube screenshot)A concept for a “Very Large Floating Structure” mobile sea base is shown in a Chinese promotional video, which was posted online by naval defense industry magazine, Navy Recognition. The mobile base project was recently unveiled at the National Defense Science and Technology Achievements exhibition in Beijing. (YouTube screenshot)

This news analysis was originally dispatched as part of Epoch Times’ China email newsletters. Subscribe to the newsletters by filling your email in the “China D-brief” box under this article.

An odd project was unveiled at a recent military exhibition in Beijing, showing what could be the Chinese regime’s solution to both its lack of aircraft carriers, and the controversies around its island building programs.

The project is a “Mobile Sea Base” concept, using the fitting name of “Very Large Floating Structures” (VLFS). Gemäß einer August. 9 report from naval defense industry magazine, Navy Recognition, the Chinese regime’s VLFS project was publicly revealed at the National Defense Science and Technology Achievements exhibition in Beijing.

I poked fun at this project in a previous report, but its implications are actually rather serious.

Die Kommunistische Partei Chinas (CCP) detailed its global naval ambitions in its May 26 military strategy white paper. It plans to discard “the traditional mentality that land outweighs sea,” according to the white paper, and will begin to “protect the security” of strategic sea lines of communications, as well as “overseas interests.”

“Strategic sea lines of communications” is a fancy way of saying global maritime trade routes, and includes the handful of shipping chokepoints around the world. As I detailed in a recent report, the CCP is hard at work—around all these strategic locations—signing deals that would give it access to, or control of, local ports.

If you were to take the United States as an example, it’s able to have a global military presence thanks to its aircraft carriers and its military relationships with countries around the world, which grant it port access and land bases.

The Chinese regime, andererseits, has only one very old and rickety aircraft carrier, and while it’s negotiating port access with countries around the world, most of these deals are still around trade, and its warships are still largely unwelcome.

This is where the VLFS Mobile Sea Bases come into play. The CCP’s strategy to close gaps in naval power has so far taken the form of its man-made islands in the South China Sea. These give it stations where its ships can refuel and resupply, as well as airstrips to compensate for its lack of aircraft carriers.

Its use of man-made islands has barely been allowed in the South China Sea, mainly because the CCP has argued it has “historical” sovereignty over the region, and because (at least until recently) it faces very little military threat from the surrounding countries.

In a recent article, I explained that the CCP is likely gearing up for a maritime push into the Indian Ocean. Dort, its island construction wouldn’t work, not only because neither of the above points would apply to the Indian Ocean, but also because it lacks the reefs and shallow waters that made the CCP’s island building possible in the South China Sea.

Noch, the VLFS Mobile Sea Bases would solve all these problems. Since the bases float, very much like aircraft carriers, they would largely be immune to the legal controversies around the CCP’s man-made islands. And also because they float, they would be usable in the deep waters of the Indian Ocean.

It’s important to note that the VLFS concept isn’t new. According to Naval Recognition, the United States seriously considered building similar structures when it started Operation Desert Shield in 1990. They were called “mobile offshore bases.”

The rationale for the United States, according to Naval Recognition, was that with the structures, the United States “could have a base anywhere in the world in as little as a month,” and the bases could go beyond the capabilities of aircraft carriers to accommodate even very large aircraft like the C-17 Globemaster III.

The Chinese regime is already showing off concepts for the bases. If they decide to build and deploy them in the Indian Ocean, the world will face a situation similar to what’s happening already with Chinese military presence in the South China Sea.

Lesen Sie den ganzen Artikel hier

Original Artikel hier klicken