By Thomas Nelson

In a publication that's as guaranteed to be as debatable because it is meticulously researched, a former specified assistant to the president for nationwide protection Affairs and senior professional of the critical Intelligence supplier exhibits that the U.S. will be headed towards a nuclear face-off with communist China inside of 4 years. And it definitively finds how China is progressively pursuing a stealthy, systematic technique to reach geopolitical and financial dominance first in Asia and Eurasia, then most likely globally, in the subsequent twenty. utilizing lately declassified records, statements through Russian and chinese language leaders principally missed within the Western media, and groundbreaking research and investigative paintings, Menges explains China's plan completely, exposing: China's tools of financial regulate. China's mystery alliance with Russia and different anti-America international locations, together with North Korea. China's starting to be army and nuclear power-over ninety ICBMs, a lot of them geared toward U.S. towns. How China and Russia were liable for weaponizing terrorists bent on harming the united states harm brought on by China's exchange strategies (since 1990, we have now misplaced eight million jobs because of China exchange surpluses).

Show description

Read Online or Download China: The Gathering Threat PDF

Similar intelligence & espionage books

The Thin Green Line: An Assessment of DoD's Readiness and Environmental Protection Initiative to Buffer Installation Encroachment

This monograph assesses the effectiveness of DoD's Readiness and Environmental defense Initiative to assist checking out and coaching installations take care of encroachment from sprawl and different resources. The authors determine the most motives of encroachment; aspect the advantages, either to the army and native groups, of buffering parts close to installations with REPI tasks; and supply innovations for the way to enhance REPI's effectiveness.

British Military Intelligence in the Crimean War, 1854-1856 (Cass Studies in Intelligence)

This can be a learn of the British army intelligence operations through the Crimean battle. It info the beginnings of the intelligence operations because of the British Commander, Lord Raglan's, want for info at the enemy, and lines the next improvement of the method.

Extra info for China: The Gathering Threat

Sample text

In thefirstphase of Communist rule, Mao recognized the need to move gradually 26 CHINA: THE GATHERING THREAT to consolidate control over existing institutions in society. For that reason, Mao wrote that the initial economic structure should consist of a state economy where the government controlled the major industries, mines, and utilities; an agricultural economy, in which individual farms would develop into collective farms; and a private economy, in which private middle- and small-sized businesses would be allowed to continue.

S. S. policy toward that country since President Carter reestablished full diplomatic relations in 1979. It is worth tallying up the exact accomplishments that policy can claim. The continuing crackdown on religious believers, human rights, and proponents of democracy has already been mentioned. The rule of the Communist Party continues and, in January 2000, then-President Jiang Zemin reiterated that China would remain Communist and that political democracy would never be permitted. "5 As to the economic benefits of trade, they have been largely one-sided for China.

Nevertheless, in its broad outlines, the following closely approximates the overall Chinese strategic approach. PHASE I: Normalization of economic relations with the democracies (1978 and continuing). A period of controlled economic liberalization and normalization with the West to promote the economic, technological, and military modernization of China. " PHASE II: Asian regional persuasion and coercion with global geostrategic and economic positioning (late 1980s and continuing). China strengthens its geopolitical-economic positioning throughfinancial,political, and covert action.

Download PDF sample

Rated 4.30 of 5 – based on 26 votes