A high-ranking Chinese defector to America with full access to Beijing's powerful Secret Intelligence Service (CSIS) - has revealed the most comprehensive ever details of China's spying operations against key economic and industrial targets in the United States.
State-of-the-market research and technology worth an estimated £14 billion has been stolen in the past three years since CSIS intensified its operations in the U.S.
The defector, Colonel Xu Junping, was Director of Strategy in China's Defence Ministry. For the past six years he oversaw all secret operations by CSIS against the West.
Xu has told his CIA debriefers how:
· CSIS has established bases in New York, San Francisco China Town and other cities. Some are above restaurants or brothels.
· CSIS pays for Chinese students to have further education in America. Many attend university post-graduate courses at our leading universities, including Harvard and Yale.
· After qualifying - usually in computer or science-related subjects - those students are taught how to apply for jobs with U.S. firms - some of whom have sensitive defence contracts. Xu has provided a list of target firms. Most are in the high-tech industry.
· CSIS trains those graduates to steal trade secrets from their employers and bring them to safe houses. Xu has provided a list of the houses.
· CSIS has twenty full-time agents working in the U.S. Only two of them have diplomatic status. The others are attached to Chinese business organizations to provide them with cover for their secret activities. The number of CSIS agents is larger than any other foreign intelligence service operation in the United States.
In the time Xu has been kept under wraps in a safe house deep in the countryside outside Washington D.C. - its perimeter guarded by crack-shot agents - the slim, good-looking 45-year-old defector has also provided invaluable insights into how much China knows:
· Of CIA operations in the Far East.
· How China secretly contravened sanctions against Saddam to re-arm Iraq with nuclear weapons. Iraq now has a capability of producing long-range nuclear missiles.
· How China secretly helped Slobodan Milosevic during the Balkans War - and how a CSIS team flew to Belgrade, ready to whisk Milosevic to sanctuary in China, shortly before he was arrested and sent to The Hague War Crimes Tribunal.
Even more alarming was Xu's revelation that Osama bin Laden - to the U.S. "the grandmaster of terrorism" - has close contacts with CSIS.
"Our intelligence service operates on the principle that your enemies are our potential allies," Xu told his debriefers.
So important were some of Xu's revelations that U.S. National Security Advisor, Condoleezza Rice, sat in on debriefings. She heard:
· Xu confirm CSIS plans to stage an escalating series of crises to help China.
· How CSIS is working hard to exploit Europe's growing problem with asylum seekers.
Xu's predictions have now been included in a CIA report entitled "Global Trends Up to 2015."* The report contains these chilling claims:
· CSIS will provide biochemical and small nuclear devices to terrorist groups to attack the United States.
· CSIS will increasingly support rogue states like Iraq and Iran. "On present calculations, with the help of China, both countries will have gone nuclear by the year 2005," says the report. The report is a grim precursor to the present economic slowdown.
· CSIS will exploit the present economic stagnation that will reach its peak in the year 2015.
All the indications are there could be a major war by then. The main protagonists will be China and America. But Britain and NATO will inevitably be drawn in.
White House sources say a copy of the report is permanently on President Bush's desk in the Oval Office.
Xu, who speaks fluent English, was one of China's new breed of high fliers, "a brilliant strategist" - according to one CIA source.
He defected with nothing but the clothes he wore and a small overnight case. With his diplomatic passport, he had no problem catching a China Air flight to Bangkok. From there he flew to Washington. There he called a number a CIA agent had given him in Beijing.
An hour later he was installed in the CIA safe house. Five months of intensive debriefing is now over. During that time Xu was given the courtesies of a top-level defector.
He had his own chef to cook his favorite Chinese meals. Disguised in wig and padded suit to add weight to his slim body, he was taken to sports games.
Even his passion for football was catered to. Videos of Manchester United, his favorite team, were obtained from Britain for him to watch.
Then it was back to work, talking for hours into a microphone.
Xu has now entered the Witness Protection Program. He will have plastic surgery to change his appearance. A language teacher will coach him in the latest buzz words. He will get used to his new name. A job will be found for him and he will have a secret pension for life.
But he will have no physical protection against the ever present threat that a CSIS team will assassinate him.
"To give him a bodyguard would be to draw attention to him," said an FBI source. "His best protection will be his ability to melt into his chosen background."*
*A large portion of the "Global Trends Up to 2015" document and the full story of Xu Junping's revelations are included in Gordon Thomas' most recent book, Seeds of Fire: China and the Story Behind the Attack on America.
Seeds of Fire: China and the Story Behind the Attack on America, published by Dandelion Books, at www.dandelion-books.com, www.dandelionbooks.net, www.hiddenmysteries.com. "Autographed by the Author" Limited First Edition copies are now available through (toll-free) 1-888-609-5006.
Gordon Thomas is a writer on intelligence for a number of leading European newspapers (the Sunday Express, UK; El Mundo, Spain; Welt am Sonntag, Germany). His work is also syndicated internationally by World Wide Syndication. Any use of the above must carry a clear attribution to both Gordon Thomas and Globe-Intel. He is a Contributing Editor to Globe-Intel, an international newsletter devoted to intelligence matters.
To invite others to subscribe to Globe-Intel, have them click here:
FOR MEDIA INTERVIEWS:
Contact: Publicity Dept., Dandelion Books;
5250 South Hardy Drive - Ste. 3067,
Tempe, Arizona 85283;
Notice: TGS HiddenMysteries and/or the donor of this material may or may not agree with all the data or conclusions of this data. It is presented here 'as is' for your benefit and research. Material for these pages are sent from around the world. If by chance there is a copyrighted article posted which the author does not want read, email the webmaster and it will be removed. If proper credit for authorship is not noted please email the webmaster for corrections to be posted.
FAIR USE NOTICE. This site may at times contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc.. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.
In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml
United States Code: Title 17, Section 107 http://www4.law.cornell.edu/uscode/unframed/17/107.html Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include - (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.