Your Source for Leaks Around the World!

Posts Tagged ‘Chinese’

Chinese Activists Breach Liu Xia’s House Arrest

In China, China, News, NWO, Other Leaks, Police State, Viral Videos, World Revolution on December 31, 2012 at 7:18 PM



Dramatic video footage emerges of one of China’s top dissidents breaking through a security cordon to reach the wife of jailed Nobel laureate Liu Xiaobo, who is herself under house arrest.

Liu Xia has been under house arrest in her Beijing apartment since her husband was awarded the Nobel Peace Prize in 2010 and subsequently arrested.

Over the past two years she’s reportedly only been able to visit her parents and her husband in jail; she’s had no contact with the outside world.

It’s believed her husband Liu Xiaobo irritated the Chinese government as a writer and human rights activist, openly calling for an end to communist party rule.

Oregon Woman Finds Help Letter from Chinese Labor Camp Worker in Kmart Halloween Decorations

In China, News, Other Leaks, Police State on December 29, 2012 at 7:21 PM



The letter came in a box of Halloween decorations purchased at Kmart, but for a year Julie Keith never knew. It gathered dust in her storage, a haunting plea for help hidden among artificial skeletons, tombstones and spider webs.

Keith, a 42-year-old vehicle donation manager at a southeast Portland Goodwill, at one point considered donating the unopened $29.99 Kmart graveyard kit. It was one of those accumulated items you never need and easily forget. But on a Sunday afternoon in October, Keith pulled the orange and black box from storage. She intended to decorate her home in Damascus for her daughter’s fifth birthday, just days before Halloween.

She ripped open the box and threw aside the cellophane.

That’s when Keith found it. Scribbled onto paper and folded into eighths, the letter was tucked between two Styrofoam headstones.


“If you occasionally buy this product, please kindly resend this letter to the World Human Right Organization. Thousands people here who are under the persicution of the Chinese Communist Party Government will thank and remember you forever.”

The graveyard kit, the letter read, was made in unit 8, department 2 of the Masanjia Labor Camp in Shenyang, China.

Chinese characters broke up choppy English sentences.

“People who work here have to work 15 hours a day without Saturday, Sunday break and any holidays. Otherwise, they will suffer torturement, beat and rude remark. Nearly no payment (10 yuan/1 month).”

Ten yuan is equivalent to $1.61.

“People who work here, suffer punishment 1-3 years averagely, but without Court Sentence (unlaw punishment). Many of them are Falun Gong practitioners, who are totally innocent people only because they have different believe to CCPG. They often suffer more punishment than others.”

The letter was not signed.

Shocked, Keith sat down as her mind reeled.

Wow, that’s daring, she thought. She imagined the desperation the writer must have felt, the courage he or she must have mustered to slip the letter into that box. If caught, what would happen?

Like a message in a bottle, the letter traveled more than 5,000 miles over the Pacific Ocean. It could not be ignored.


Unsure of where to start, Keith turned to Facebook.

“I found this in a box of Halloween decorations” she typed beneath a photo of the letter. She wanted to spread the message.

The Facebook post sparked a slew of responses. Her friends had heard of labor camp horrors. But a letter from one of those camps? Never.

“I’m sure that person feared for his/her life to include that letter in the products, but it was a chance they were obviously willing to take,” one friend wrote. “We take our freedom for granted!”

“What’s weird to me is someone is actually thinking about, and praying something comes of this … every day of their life since they sent it out,” another wrote. “Makes me sad this even happens”

Some friends offered help, others asked for updates.

The anonymous letter evoked skepticism, too. Written largely in English scrawl, it was almost too bold of an act to seem plausible. Still, U.S. authorities on China took note.

“We’re in no position to confirm the veracity or origin of this,” said Sophie Richardson, China director at Human Rights Watch. “I think it is fair to say the conditions described in the letter certainly conform to what we know about conditions in re-education through labor camps.”

China’s re-education through labor is a system of punishment that allows for detention without trial. Various reports allege followers of the banned spiritual group, Falun Gong, are sent to the reform camps – claims supported in the letter – but the facts are difficult to confirm.

Masanjia labor camp is located in the industrialized capital of the Liaoning Province in northeast China. A Google search of the camp yields pages of grim results.

“If this thing is the real deal, that’s somebody saying please help me, please know about me, please react,” Richardson said. “That’s our job.”


If truly created in a forced labor camp, the Halloween graveyard kit from Kmart’s “Totally Ghoul” product line could bring a blow to the U.S. chain of discount stores.

Title 19, section 1307 of U.S. Code generally prohibits the importation of all items “mined, produced or manufactured” in any foreign country by convict labor, forced labor and/or indentured labor.

After the Oregonian informed the U.S. Immigration and Customs Enforcement about the letter, ICE’s Homeland Security Investigations began looking into the case, public affairs officer Andrew Munoz confirmed.

Sears Holdings Corporation, which operates Kmart, released a statement on the matter:

“Sears Holdings has a Global Compliance Program which helps to ensure that vendors and factories producing merchandise for our company adhere to specific Program Requirements, and all local laws pertaining to employment standards and workplace practices. Failure to comply with any of the Program Requirements, including the use of forced labor, may result in a loss of business or factory termination. We understand the seriousness of this allegation, and will continue to investigate.”

Daniel Ruiz, section chief of the National Intellectual Property Rights Coordination Center’s commercial fraud unit, said it would be difficult to predict the length of an investigation like this, which would involve American and Chinese authorities. Investigative findings would be released, he said, only if the agency takes action.


Julie Keith now checks the label of everything she buys, down to the Gingerbread house she purchased for the holidays. Her friends, she said, do the same.

“If I really don’t need it, I won’t buy it if it’s made in China,” she said. “This has really made me more aware. I hope it would make a difference.”

Chinese Hackers Suspected in Cyber Attack on Council on Foreign Relations

In China, News, NWO, Other Leaks, Science & Technology, USA on December 29, 2012 at 5:26 PM



Computer hackers traced to China carried out an advanced cyberespionage attack against one of America’s most elite foreign policy web groups – the website of the Council on Foreign Relations (CFR).

According to private computer-security forensic specialists, the hacking incident involved a relatively new type of ploy called a “drive-by” website cyber attack that was detected around 2:00 p.m. on Wednesday.

The specialists, who spoke on condition of anonymity, said the attack involved penetrating the computer server that operates the New York City-based CFR’s website and then using the pirated computer system to attack CFR members and others who visited or “drove by” the site.

The activity ended on Thursday and the specialists believe the attackers either removed their malicious software to prevent further details of the attack from being discovered, or CFR was able to isolate the software and remove it.

The FBI was notified of the attack and is said to be investigating.

FBI spokeswoman Jennifer Shearer declined to comment when asked about the attack. But she told the Washington Free Beacon: “The FBI routinely receives information about threats and takes appropriate steps to investigate those threats.”

However, David Mikhail, a Council on Foreign Relations spokesman, confirmed the attack. “The Council on Foreign Relations’ website security team is aware of the issue and is currently investigating the situation,” Mikhail said in an email. “We are also working to mitigate the possibility for future events of this sort.” He provided no details.

According to the computer security specialists, the cyber espionage attack represents a new level of sophistication by foreign hackers seeking government and other secrets by computer.

The method used in a “drive-by” attack requires hackers to covertly plant malicious software in the CFR computer system. Then, they used the software and the web site to attack visitors to the site by infecting their computers in a hunt for secrets and other valuable information. One of the specialists said the attack also involved using the CFR site for what is called a “watering hole” attack, when people who visit the website are infected.

One of the victims who visited the CFR’s website,, discovered the attack and alerted computer security specialists on Wednesday.

In response, a small group of private security specialists launched an investigation into the activity and found that it only targeted computer users using the web browser Windows Internet Explorer 8 and higher versions. The attackers were able to exploit a security flaw in the browser software called a “zero-day” vulnerability – a previously unknown flaw that allows computer hackers to gain access to a targeted computer.

A similar Internet Explorer vulnerability was behind the major Aurora cyber attack on Google and other U.S. corporations that began in 2009 and was traced to China’s government.

Investigators said the computer attackers that targeted CFR were able to set up a covert network capable of identifying, encrypting, and sending stolen information found in targeted and infected computers back to a secret command and control computer.

In the case of the CFR hack, the malicious software involved software that included Mandarin Chinese language, the specialists said. Also, the attackers limited their targeting to CFR members and website visitors who used browsers configured for Chinese language characters – an indication the attackers were looking for people and intelligence related to China.

“This was a very sophisticated attack,” said one of the specialists. “They were looking for very specific information from specific people.”

The extent of the damage is not known but CFR members who visited the website between Wednesday and Thursday could have been infected and their data compromised, the specialists said.

The CFR is one of the most elite foreign policy organizations in the United States with a membership of some 4,700 officials, former officials, journalists, and others. Its members include NBC anchor Brian Williams, Hollywood actress Angelina Jolie, and former Sen. Chuck Hagel, President Obama’s embattled but as yet un-nominated choice for secretary of defense.

Current Secretary of State Hillary Clinton and Assistant Secretary of State Kurt Campbell, the Obama administration’s senior Asian affairs policy maker, also are CFR members. Senate Intelligence Committee Chairman Sen. Dianne Feinstein (D., Calif.) is also a member, as is Secretary of State-designate Sen. John Kerry.

Its board and members include a who’s who of U.S. foreign policy and national security elites, including former U.S. Central Command commander Army Gen. John Abizaid, and former Secretaries of State Madeleine K.  Albright, Colin Powell, and Henry Kissinger.

Fox News CEO Roger Ailes also is a member, as is News Corp. chairman and CEO Rupert Murdoch. Former Presidents George W. Bush and Bill Clinton are members, as is former CIA Director and former Defense Secretary Robert M. Gates and former CIA Director David Petraeus.

The CFR cyberstrike is not the first strategic drive-by cyber attack.

The computer security website Dark Reading reported in May that the Center for Defense Information, and the Hong Kong chapter of the human rights group Amnesty International (AIHK), along with several other organizations, also were attacked using similar drive-by methods.

“The weapon of choice for a cyberspy or advanced persistent threat (APT) actor gaining a foothold inside its target traditionally has been the socially engineered email with a malicious link or attachment,” DarkReading stated. “But cyberspies are increasingly targeting specific, legitimate websites and injecting them with malware in hopes of snaring visiting victims from organizations from similar industries and sectors.”

Japan Coast Guard: Chinese Navy Ships Enter Disputed Waters

In China, Japan, News, Other Leaks on December 21, 2012 at 3:31 AM


The Japanese Coast Guard reported that three Chinese maritime surveillance vessels have sailed into the territorial waters of disputed islands in the South China Sea, the first such intrusion since Japan elected its new government, AFP reported.

The ships were spotted northwest of Kubajima Island, in the archipelago dubbed Senkaku by Japan and Diaoyu by China, at around 10:20am local time (0120 GMT).

Chinese government ships have repeatedly entered the waters since September. Analysts believe that China is challenging Japan’s de facto control of the islands for the past 40 years.

Chinese Dawa Zi Acrobat Survives High-Wire Fall

In China, News, Viral Videos on July 8, 2012 at 6:52 AM


A Chinese Dawa Zi acrobat escaped with minor injuries after falling off a high wire 200 metres above ground, according to China state television channel CCTV.

Aisikaier was apparently attempting to walk backwards across a ravine in Hunan Province, wearing a blindfold, when he lost his balance.

He was reportedly just 40 metres near the end of the 700 metre walk, when he lost his footing and fell.

Aisikaier, who is a traditional sixth-generation performer, is said to have escaped with only minor injuries, and was later shown walking back up the ravine.

%d bloggers like this: