He is so ordinary that he is almost invisible.
If you passed him on the street, you would see a pudgy middle-aged man with glasses dressed in a drab blue suit.
At first glance, he looks like a corporate accountant. He is soft spoken, mild mannered, very polite.
He never speaks harshly, threatens, or makes demands.
No one would ever imagine that this low-key, courteous professor is one of the most dangerous men on earth – with the ability to radically change the world.
He climbed a twisted path to power, fighting his way through the most ruthless organization the world has ever known.
He has survived in a treacherous domain rife with vicious infighting, where mistakes are punished severely, where advancement requires flawless strategy devised by a razor sharp mind.
No Pharaoh, Emperor Or King Has Ever Wielded Such Power…
This mild-mannered man made his bones in the most treacherous environment; where you cultivate secrecy and stealth.
Where you strike with the cruelty of an assassin, and only iron will allow you to emerge victorious.
For the past ten years, he has engineered the overthrow the American empire with one click of a mouse
His name is Geng Huichang.
And on September 6, 2007, Geng became the Minister of State Security – China’s equivalent of the Soviet KGB…
This date marked a tipping point in history.
It was the day China’s strategy of the “Peaceful Rise”- went into overdrive – quickening America’s decline as the world’s superpower.
Geng Huichang’s rise to power is shrouded in darkness – very little is known of this cryptic official of China’s Communist Party.
A pudgy man whose cherubic face is framed by thick glasses, he does not exactly convey physical menace.
Chinese officials would have you believe he is an academic who is “discreet in conduct and prudent in speech.”
Probe deeper, and you find a stealth assassin; a shadow warrior.
Hong Kong’s Sing Tao Daily describes Geng as “an expert on America and the application of commercial and industrial intelligence”…
More than that – Geng is a specialist on cyber warfare – an accomplished master thief of military secrets and sensitive technologies.
A master poker player, his ace is a…
A True Phantom Menace
Former Indian Prime Minister Vajpayee had a meeting with him when Geng ran a Chinese think tank in 1993.
This think tank – financed by the “intelligence wing of the foreign office” – was devoted to the study of terrorism as a form of asymmetrical warfare
In a rare moment of candor, Geng revealed the true motivation fueling China’s strategies.
He told Vajpayee,“We Asians must realize that the western model of democracy… is unsuitable for us…”
2007, the year he took over the Ministry of State Security, saw a significant upsurge of our military and commercial databases being hacked into – with their hard drives infected by viruses and malware.
American officials have acknowledged that these cyber attacks have breached firewalls guarding our nation’s most vital secrets.
These attacks have been confirmed by the Financial Times in their September 3, 2007, edition.
In it, Pentagon sources confirmed the most successful cyber attack ever on American defense system by China’s People’s Liberation Army…
“The PLA has demonstrated the ability to conduct attacks that disable our system… and the ability in a conflict situation to re-enter and disrupt on a very large scale…”
In April of 2009, the Wall Street Journal reported that computer systems containing data about the F-35 fighter jet had been compromised.
The penetration of the $300 billion Joint Strike Fighter project, its design and electronics systems hacked into, may enable America’s enemies to shoot down our most advanced weapon in our arsenal.
Another report reveals invasions into critical infrastructure facilities… our Air Force’s air traffic control network… our national electrical grid… the exposure of our nation’s security to a…
A Clear and Present Danger…
Geng’s operatives have infiltrated government and private networks with malware programmed to disrupt or destroy these crucial systems.
Cyber raids staged by China’s army of hackers have cost the U.S. hundreds of billions of dollars per year…
Commercial, technological and military secrets vital to America’s security have been stolen.
This escalating threat was the subject of House Armed Services Committee hearings.
Admiral Robert Willard – a retired United States Navy admiral 22nd Commander, U.S. Pacific Command from October 19, 2009, to March 9, 2012- warned the House Armed Services Committee about China’s penetration of our computer networks…
“U.S. government networks and computer systems continue to be the target of intrusions that appear to have originated from within the PRC … These threats challenge our ability to operate freely in the cyber commons, which in turn challenges our ability to conduct operations during peacetime and in times of crisis.”
Companies such as Google and other members of the Fortune 500 club have reported invasions of their computer systems originating from China.
This is the most sophisticated and massive industrial espionage operation launched by a foreign power…
Former CIA director Leon Panetta recognizes the danger posed by this threat…
“It could threaten our grid system… It could threaten our financial system… It could threaten our financial system… It could paralyze this country…”…
Steven Chabinsky – former Deputy Assistant Director of the FBI’s Cyber Division, now Chair of the Firm’s Global Data, Privacy & Cybersecurity Practice at White & Case LLP International Law Firm does not mince words.
“The cyber threat can be an existential threat — meaning it can challenge our country’s very existence, or significantly alter our nation’s potential.”
The Invasion of the Cyber Assassins
From 2010 until 2013 China’s spies hacked into computers at the Federal Deposit Insurance Corporation.
China hacked into 12 computers and ten backroom servers at the FDIC, including the personal computers of the FDIC chairman, his chief of staff, and the general counsel.
The FDIC hid this security breach from government investigators by banning it from email communications before confessing it did not reveal the full extent of the damage done to our national banking regulator.
In May of 2014, a grand jury indicted five Chinese military hackers with cyber-espionage against American companies.
They were charged with stealing trade secrets from six major American corporations, including Westinghouse Electric, US Steel, Allegheny Technologies, Alcoa, and subsidiaries of Solar World.
The Chinese hackers also hacked into the United Steel Workers and other union computer systems.
It is well known to insiders that cyber espionage has been a successful tool for Chinese hackers to steal valuable trade secrets and intellectual property from American businesses and industries.
In October 2014, Chinese cyber-spies stole vital information from Apple iCloud users following similar attacks against Microsoft, Yahoo, and Google users by impersonating their service providers and intercepting communications.
Even worse is theft of military technology crucial to the survival of the United States.
The Chinese hacked into the computer networks of Boeing and Lockheed Martin and stole secrets vital to our military including F-22 and F-35 fighter jet specs and technology.
Military technology stolen by the Chinese includes the PAC-3 Patriot missile, the army’s Terminal High Altitude Area Defense, the F/A-18 fighter jet, the V-22 Osprey, and the Black Hawk helicopter…
And the Navy’s Aegis ballistic-missile defense system.
On April of 2015, the Chinese pulled off the greatest heist of data essential to our national security when they breached the records of our Office of Personnel Management.
The stolen data in the hack included compromising information on intelligence and military personnel.
Overall 20 million government employees are involved.
This included the Standard Form-86 attached to each of the personnel’s files with individual records of past convictions and financial problems, drug and alcohol abuse trouble and any infidelities and affairs with citizens of hostile nations.
Plus social security numbers and personal addresses, including those of relatives. And copies of fingerprints.
How deep is this damage? Let’s take from the Committee on Oversight and Government Reform.
On September 7, 2016, they issued a report called…
“The 0 PM Data Breach: How the Government Jeopardized Our National Security for More than a Generation”
“This is crown jewels material … a gold mine for a foreign intelligence service. ”
“This is not the end of American human intelligence, but it’s a significant blow. “ — Joel Brenner, former NSA Senior Counsel
“We cannot undo this damage. What is done is done, and it will take decades to fix. — John Schindler, former NSA officer
“[The SF-86J gives you any kind of information that might be a threat to [the employee’s] security clearance.’’ — Jeff Neal, former DHS official
“My SF-86 lists every place I’ve ever lived since I was 18, every foreign travel I’ve ever taken, all of my family, their addresses. So it’s not just my identity that’s affected. I’ve got siblings. I’ve got five kids. All of that is in there.” — James Comey, Director of the FBI
“[0 PM data] remains a treasure trove of information that is available to the Chinese until the people represented by the information age off. There ’s no fixing it. ’’ — Michael Hayden, former Director of the CIA
The Chinese used Remote Access Trojans malware which allowed hackers to control computers in a manner hard to detect and trace.
In fact, you can even make it look like hackers from a different country did the deed.
Besides the danger posed to financial, commercial and military institutions…
There is the risk to our infrastructure facilities essential for keeping our towns and cities safe and livable.
Critical infrastructure such as America’s electricity grid, water purification plants, air traffic control, subway systems, and telecommunications can be shut down.
A Message from Geng In Macao
After a wildly successful tenure as head of the MSS – the Ministry of State Security -, I have retired, and I now reside in luxury suite in the city of Macao – China’s Las Vegas, only better – as your President would say – believe me.
And you better believe me that you are in big trouble.
Of course in a totalitarian state like China, you don’t retire as a high ranking official – unless it is with a bullet in your brain.
No, I got farmed out to the CPPCC, Subcommittee for Hong Kong, Macao, Taiwan and Overseas Chinese where I can keep an eye on on foreign devils and their nefarious activities on our sacred soil and when they are in their barbaric countries.
And I can track our own miscreants who think they can do whatever they want because they are away from the mainland. It makes for entertaining video and excellent blackmail material.
Remember to shut down your computers and smartphones when they are not needed… we can see and hear you.
I can’t complain… my crib here is really plush and it beats a bullet in the brain.
And just think of the havoc I can wreak upon you with a click of a mouse.
Not only have we stolen your technology to become a first rate military power that can reduce you to radioactive ashes…
We have planted malware everywhere in your communications, banking, infrastructure and military systems.
With a click of a mouse, I can shut down your airports or create a stock market panic with massive computer-generated sell-offs at the same time.
With a click of a mouse, I can disarm your ballistic missiles and misdirect your air force and navy.
Just imagine you are at home enjoying Super Bowl Sunday.
At least you are trying to enjoy it despite the fact the stock market crashed on Friday. They blamed it on a computer glitch that triggered a massive sell-off.
So you are stuffing another nacho in your mouth when the electricity shuts down.
You pick up your cell phone to call the power company, but there is no signal.
You try your land line, but no, it is as dead as a disgraced Chinese politician with a bullet in his brain.
Before you scramble for your flashlight, you run outside, and there is only total darkness and silence outside.
Your neighbor is outside too, and the look on his face tells you everything you need to know.
Back inside your wife is fiddling with the battery powered radio but she can only get screeching static out of it.
Your kids keep calm playing games on their tablets, but you know their batteries are not going to last long.
It is now chilly in the house, so you grab some blankets and hunker down for the night.
Next morning you awake, and nothing has changed but the dim light of down coming through your windows.
And there is no hot water but a foul-smelling cold water.
You get in your car and go into town with the hope of buying a kerosene operator heater.
As you pull out of your driveway, you notice a pillar of black smoke on the horizon where you were going.
You head over to Walmart ready to stock up on supplies, enough to last a long time.
When you arrive, a mob has already infested the store, striping the shelves bare like a plague of locusts.
You don’t bother to go in but drive over to a Walmart driver guarding his truck with his rifle.
He tells you he has no fuel; the gas stations are already empty.
Last night he heard on his short wave radio – no longer functioning now – that this was happening everywhere, coast to coast and the last thing he heard was the President imposing martial law.
Meanwhile, the military is nowhere to be found.
You are grateful that he accepts your invitation to stay with you.
Quickly you fill your back seat, and the trunk with water and canned food and the driver grabs some guns and ammo that was in his shipment.
You drive back in silence hoping the national guard or some military guys will show up in your neighborhood.
You search the silent sky for an airplane, but none is in sight.
It would be good to see a cop car, wouldn’t it? Okay my American friends, do you get the picture.
While you were babbling about Russian hackers, we took your country without firing a shot.