Chinese Weapons of War – Part Three

Chinese Weapons of War – Part Three

(Part One here and Part Two, here.)

BEIJING, Oct. 7, 2019/PRNewswire/ — President Xi Jinping at a grand rally at Tian’anmen Square in Beijing to celebrate the 70th anniversary of the founding of the People’s Republic of China (PRC).

President Xi Speech before reviewing the Military Parade —

“We gathered here today for a grand rally to celebrate the 70th anniversary of the founding of the PRC,” said Xi, also general secretary of the Communist Party of China Central Committee and chairman of the Central Military Commission.

“Right at this moment, Chinese people of all ethnic groups and all the sons and daughters of the Chinese nation at home and abroad take pride in and give our best wishes to our great motherland with great joy,” he added.

Xi remembered revolutionary forefathers and martyrs for their feats in pursuing national independence and liberation, a stronger and more prosperous country and the people’s well-being.

Xi extended warm National Day congratulations to Chinese people of all ethnic groups and all compatriots at home and abroad.

Xi also expressed heartfelt gratitude to friends around the world for their caring for and support to China’s development.

The founding of the People’s Republic of China (PRC) completely changed China’s miserable fate of being poor and weak and being bullied and humiliated in over 100 years since the advent of modern times, Xi said.

“Seventy years ago on this day, Comrade Mao Zedong solemnly declared here to the world that the PRC was founded and the Chinese people had stood up,” Xi said.

The Chinese nation has since then embarked on the path of realizing national rejuvenation, he said.

No force can ever shake the status of China, or stop the Chinese people and nation from marching forward, Xi said.

Xi said Chinese people of all ethnic groups have made great achievements that amaze the world, over the past seven decades through concerted efforts and arduous struggle.

Xi called for upholding the leadership of the Communist Party of China (CPC).

Xi underlined the importance of ensuring the principal status of the people, staying on the path of socialism with Chinese characteristics, and fully implementing the Party’s basic theory, line and policy.

He also called for efforts to constantly meet people’s aspirations for a better life and make new historic achievements.

Xi pledged that the country will stay on the path of peaceful development, and pursue a mutually beneficial strategy of opening up.

“We will continue to work with people from all countries to push for jointly building a community with a shared future for humanity,” Xi said.

He stressed that the Chinese People’s Liberation Army and the People’s Armed Police Force should always preserve their nature, purpose, and character as the forces of the people, resolutely safeguard China’s sovereignty, security, and development interests, and firmly uphold world peace.

“On our journey forward, we must uphold the principles of ‘peaceful reunification’ and ‘one country, two systems,’ maintain lasting prosperity and stability in Hong Kong and Macao, promote the peaceful development of cross-Strait relations, unite all Chinese sons and daughters, and continue to strive for the motherland’s complete reunification,” Xi said.

Xi called for concerted efforts to achieve the two centenary goals and realize the Chinese Dream of national rejuvenation.

China’s yesterday had been inscribed in human history while China’s today is being created in the hands of hundreds of millions of Chinese people, Xi said, adding that “China will surely have an even brighter future.”

All Party members, armed forces and people of all ethnic groups should unite more closely together, stay true to the founding mission, build on existing achievements and continue to develop our people’s republic, Xi said, adding that continued efforts should be made to achieve the two centenary goals and national rejuvenation.

–SOURCE PR Newswire


The precision movement of each step of the military drill (marching) was in lockstep, almost robotic. The number of marchers totaled 1000 – 2000.

Psychologic observation:

  1. Disciplined
  2. Stoic
  3. Empty Eyes
  4. Purposeful
  5. Stiff

These five observations are examples of time spent in a controlled environment with every aspect of their lives dedicated to one goal, perform the task of their specifically assigned programming.

This behavior is consistent with the MK-Ultra, a programming technique, rendering the individual into a pre-determined response.

There is no noticeable difference. However, the question arises if the method is the same, the next issue may be, “who was first to perfect mental takeover of a targeted individual?”

It is programming to create the human-robot fulfilling their task, no more no less. Control of the individual or group is its goal.

Military Personnel – ChinaActive Personnel – ChinaReserve Personnel – China
Military Personnel – USAActive Personnel – USAReserve Personnel – USA

Source – China,
Source – The USA


In an attempt to improve the Chinese position as a world-class military power, China has this firm mindset:  If we can’t build it, we will steal it.

Over many years, the Chinese military, space programs and intelligence technology have been stolen or acquired from  foreign governments or companies to advance their global ambitions. Alternately, if the Chinese do not possess a prototype, China will leak that they have as we have seen them do before. One instance of a faux build-up of a large aircraft carrier observed was birthed in a Chinese port by U.S. intelligence surveillance satellite. After a few passes over the port, the aircraft carrier was missing. The U.S. satellite overlooking the ship concluded that the aircraft carrier was a copy of a U.S. ship. It was not being built but erected to deceive the U.S. of China’s sea-worthiness. After a few weeks, China had disassembled the faux ship and was no longer observed.

This seems to have been an exercise in psychological warfare and imposing extra surveillance from the U.S.

History has taught us that China has always been a warring race, inventing many aspects of war. China’s best weapon has been its enduring patience. War plans are made years or decades before initiating.


Let’s take a look at other weapon systems China possess —


The Long March 5 (Y2) rocket – Credit: China News Service

The Chinese space program is ambitious. The most recent plan was to reach the dark side of the moon.

Why the moon? Could it be to mine for Helium 3, an element rarely found on Earth? Helium 3 is said to be an element that could fuel environmentally clean fusion power reactors producing almost unlimited power.

The moon would be ideal for surveillance base of adversaries in space and on earth. Communication would also be an asset from the moon-based station. We may never fully know their real mission to the dark side of the moon.

China first carried out a successful soft landing on the moon in December 2013 with the Chang’e-3 mission. Now with the Chang’e-4 mission, China National Space Administration (CNSA) is exploring the dark side of the Moon.

Over the past decade, China has accelerated its space program with an emphasis on satellites, many of which may be armed to enable the ability to attack or disable satellites of other nations.

Other tasks the Chinese satellites fulfill are in the field of GPS and Telecommunication. These purposed satellites are essential to serve the populations in rural areas, as well as metropolitan locations.

The satellite instrumentation consists of GPS, communication, observation, anti-satellite weapons, and ground-based targets.


Stealth Bombers

From The National Interest on October 20, 2018, in part wrote:

The H-20 will also likely be capable of carrying nuclear weapons, finally giving China a full triad of nuclear-capable submarines, ballistic missiles, and bombers. Though the H-6 was China’s original nuclear bomber, these are no longer configured for a nuclear strike, though that could change if air-launched nuclear-tipped cruise or ballistic missile are devised. Beijing is nervous that the United States’ limited ballistic missile defense capabilities might eventually become adequate for countering China’s small ICBM and SLBM arsenal. The addition of a stealth bomber would contribute to China’s nuclear deterrence by adding a new, difficult-to-stop vector of nuclear attack that the U.S. defenses aren’t designed to protect.

Some Chinese publications also argue that the H-20 will do double-duty as a networked reconnaissance and command & control platform similar to U.S. F-35 stealth fighters. This would make sense, as China has developed a diverse arsenal of long-range air-, ground- and sea-launched missiles, but doesn’t necessarily have a robust reconnaissance network to form a kill-chain queuing these missiles to distant targets. Theoretically, an H-20 could rove ahead, spying the position of opposing sea-based assets using a low-probability-of-intercept AESA radar, and fuse that information to a firing platform hundreds or even thousands of miles away. The H-20 could also be used for electronic warfare or to deploy specialized directed energy.

In an article for USA Today on May 28, 2013, Doug Stanglin wrote: “Chinese hackers have gained access to the designs of many of the nation’s most sensitive advanced weapons systems, according to report prepared for the Defense Department and government and defense industry officials.”


From Military Machine on Jan 01, 2019, U.S. Marine Corps Veteran wrote:

When the Air Force set out requirements to make a Long Range Strike Bomber (LRSB) for the 21st century, Northrup Grumman developed the B-21 Raider. The name of the bomber aircraft was introduced by one of the last surviving “Doolittle Raiders”, Richard E. Cole. At 101 years old, the retired lieutenant colonel introduced the naming structure of the B-21. When it comes to specifications, at this point the only available information is an artist’s rendering. In released artist renderings of the B-21 Raider, it appears to look extremely similar to the B-2 Spirit also produced by Northrup Grumman. The true specifications of this long-range strike bomber have not been formally published.

The B-21 Raider will be a manned aircraft. Air Force personnel overseeing the project have specified they want to have at least one human pilot “in the loop”, as this aircraft will be responsible for delivering nuclear payloads. Technologically, the B-21 Raider will serve other roles in the airspace such as command coordination, mission targeting, and communication. Because it is estimated to have similar characteristics as the B-2 Spirit, it will be able to stay in the air for long periods of time at altitudes approaching 80,000 feet. Strategically, this allows the B-21 Raider to detect any incoming surface-to-air or air-to-air threats and leave the battle space before having to take emergency evasive maneuvers.

The B-21 Raider is thought to incorporate similar design elements to other long-range stealth bombers such as the B-2. More specifically, it is said to adhere to the original concepts proposed forth for an Advanced Strategic Penetration Aircraft (ASPA). That’s the designation for an aircraft that is meant to push well past an enemy’s air defense grid before detection. This assures that should a conventional or nuclear payload be delivered, it would be done before an enemy has time to mobilize a response.


The Fighters

The technology of today is far more advanced than information in the public domain suggests. The U.S. leads the way in the new generation of fighter aircraft such as the F-35 fighter jet.

China, however, does have a fighter similar to the U.S. In fact, many of its features and new technology have been stolen from U.S. Tech and Aviation companies.

From the video above you can see that the Chinese J-31 Fighter does not compare well with the U.S. F-35. Even with the stolen tech, they have shoehorned into their fighter, they still lack the abilities the F-35 contains within its stealth capabilities.

In spite of rampant intellectual property theft, China has yet to acquire the complete secrets of the U.S. aircraft and other high tech systems required to perform to the U.S. standards. They are still behind the U.S. abilities. But thievery does not teach the Chinese how to exploit the advanced technology despite the number of intellectual technologies they steal.

Cyber Warfare

Department of Justice
Office of Public Affairs
Monday, November 27, 2017

The U.S. Charges Three Chinese Hackers Who Work at Internet Security Firm for Hacking Three Corporations for Commercial Advantage

An indictment was unsealed today against Wu Yingzhuo, Dong Hao and Xia Lei, all of whom are Chinese nationals and residents of China, for computer hacking, theft of trade secrets, conspiracy and identity theft directed at U.S. and foreign employees and computers of three corporate victims in the financial, engineering and technology industries between 2011 and May 2017. The three Chinese hackers work for the purported China-based Internet security firm Guangzhou Bo Yu Information Technology Company Limited (a/k/a “Boyusec”).

Summary of the Allegations

According to the allegations of the Indictment:

Defendants Wu, Dong, Xia, and others were known and unknown to the grand jury (collectively, “the co-conspirators”) coordinated computer intrusions against businesses and entities, operating in the United States and elsewhere. To accomplish their intrusions, the co-conspirators would, for example, send spear-phishing e-mails to employees of the targeted entities, which included malicious attachments or links to malware. If a recipient opened the attachment or clicked on the link, such action would facilitate unauthorized, persistent access to the recipient’s computer. With such access, the co-conspirators would typically install other tools on victim computers, including malware, the co-conspirators referred to as “ups” and “ex proxy.” In many instances, the co-conspirators sought to conceal their activities, location, and Boyusec affiliation by using aliases in registering online accounts, intermediary computer servers known as “hop points” and valid credentials stolen from victim systems.

The primary goal of the co-conspirators’ unauthorized access to victim computers was to search for, identify, copy, package, and steal data from those computers, including confidential business and commercial information, work product, and sensitive victim employee information, such as usernames and passwords that could be used to extend unauthorized access within the victim systems. For the three victim entities listed in the Indictment, such information included hundreds of gigabytes of data regarding the housing finance, energy, technology, transportation, construction, land survey, and agricultural sectors.

(read the full document here)

It appears that China is technically challenged when it comes to reverse engineering or stolen technologies. Whether from treaties, agreements or even a trade war costing billions of U.S. dollars in tariffs, this will always be the case the U.S. will have to overcome. And so it will remain until an agreement which includes Intellectual Property equalize trade and commerce between the two nations.

The future of new technologies is essential to maintain the lead over China but with advancements in tech, the U.S. will always be targeted for possible theft. The U.S. has been aware of the theft of technologies for many years to come and are hardening the access China has been infiltrating.


See a spelling or grammar error? Let us know! Highlight the text and press Ctrl+Enter.

Leave a Reply

2 Comment threads
0 Thread replies
Most reacted comment
Hottest comment thread
newest oldest most voted
Notify of
Ricky Walls

Incredible article as well as grouping of information. Have yet read 1 and 2. NOTE: The header on the Home Page the here links are not active. TY for what PSB does.

Tony kuo

CCP(Communist Party of China)steal US Intellectual property …especially military technology , PLA(People’s Liberation Army) military is very envy US Army .