-Caveat Lector- MONDAY DECEMBER 20 1999 <http://www.worldnetdaily.com/bluesky_exnews/19991220_xex_china_spy_ma.shtml > WARS AND RUMORS OF WARS China spy manual backs Cox report Describes techno-theft through bribery, hacking, recruitment © 1999 Human Events Editor's note: Each week, in conjunction with the hard-hitting Washington, D.C. newsweekly Human Events, WND brings you this special report. Readers can subscribe to Human Events, at a special discounted rate, through WorldNetDaily's online store. The Chinese government has confirmed - in writing - that it relied on information derived from U.S. sources to develop its nuclear weapons technology. When a similar conclusion was unanimously reached by the special select committee on Chinese military technology acquisitions chaired last year by Rep. Chris Cox, R.-Calif., it was criticized by the Clinton administration and, more recently, by a committee of professors sponsored by Stanford University. A report in the Dec. 23 issue of the Far Eastern Economic Review reveals that U.S. intelligence experts are now studying a 361-page Chinese government publication titled, "Sources and Methods of Obtaining National Defence Science and Technology." The book was written by Huo Zhonwen and Wang Zongxiao, who describe themselves in the preface as teachers at China's National Defense Science and Technology Information Center, which is a People's Liberation Army-run school in Beijing that instructs Chinese intelligence agents in how to gather technology intelligence wanted by the Chinese military. Amazingly, the book was openly published and sold in the Chinese language in 1991 and went unnoticed by U.S. intelligence agencies for eight years. "Analysts who have seen the book describe it as 'shocking,' and as one of the most important intelligence documents to have emerged on China's military espionage activities since the country launched economic reforms in 1978," reports FEER. "It belies China's claim that it uses indigenous research to develop military technology. It also details how China maintains a thorough system of gathering intelligence from abroad for military purposes, and that the U.S. is the prime focus of that effort." The authors write that the book was put together "with the help of many comrades at the center's liaison office" and that "one of the most important purposes of the book" is "as a reference for those involved in gathering national defense science and technology materials." The authors concluded that about 80 percent of the technology intelligence needed by the Chinese military could be found in open sources, but that 20 percent could be discovered only in classified sources. They paid special attention to U.S. government agencies, including the Energy Department, which overseas U.S. nuclear weapons laboratories. "Detailed explanations are given of technical information sources in the U.S. government," reports FEER, "including Congress, the Department of Defense, the Department of Energy, the National Aeronautics and Space Administration, and the National Technical Information Service. The types of reports issued by each are listed, as well as details of the classification levels of the reports based on their serial numbers." "Classified materials, it says," according to FEER, "can also be obtained through personal relationships, bribes or computer hacking. It describes how at the time of writing, Beijing's DSTIC was setting up a database of 'famous scientists' overseas, including details of their home addresses and 'whether they have ever visited China.'" FEER goes on to say, "The book also provides a glimpse into China's decision in the early 1980s to abandon attempts to develop indigenous military technologies in favor of a massive effort to obtain such technologies from abroad." A federal prosecutor in New Mexico last week indicted Wen Ho Lee, a scientist at the Energy Department's Los Alamos laboratory (who had once visited China), on charges that he had criminally mishandled some of the nation's most sensitive nuclear secrets. Lee denies that he was a spy for the Communist Chinese or gave secret data to anyone. © 1999 WorldNetDaily.com, Inc. DECLARATION & DISCLAIMER ========== CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substance—not soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om