HOUSE_OVERSIGHT_020423.jpg

1.17 MB

Extraction Summary

10
People
10
Organizations
4
Locations
6
Events
4
Relationships
10
Quotes

Document Information

Type: Endnotes / citations page
File Size: 1.17 MB
Summary

This document is a page of endnotes for a chapter titled "The Chinese Puzzle," likely from a book or extensive report. The citations reference various sources from 1999 to 2015, including government reports, news articles, and author interviews, all concerning China's technological, economic, and military activities. Although submitted as part of a larger collection related to a House Oversight investigation (as indicated by the footer), this specific page contains no information about or mentions of Jeffrey Epstein.

People (10)

Name Role Context
Snowden Source of information
Cited as the source of a video in Hong Kong related to the quote "The first [false assumption] ...".
David Tweed Author / Journalist
Author of the Bloomberg Business article "China Takes Nuclear Weapons Undersea Away From Prying Eyes" from December 8...
Nir Kshetri Author
Author of the book "The Rapidly Transforming Chinese High-Technology Industry and Market" (2008).
Paul Strassmann Mentioned Person
Mentioned in a UPI article from September 17, 2007, in relation to the quote "By 2007, Paul Strassmann...".
James Lewis Source / Quoted Person
Cited in a New York Times article from June 11, 2015, regarding the quote "Cyber attack had harvested...".
Gerald Baker Author / Journalist
Author of the Wall Street Journal article “Michael Hayden Says U.S. Is Easy Prey for Hackers" from June 21, 2015.
Michael Hayden Quoted Person
Quoted in a Wall Street Journal article by Gerald Baker on June 21, 2015.
Patrick Goodenough Author / Journalist
Author of a CNS News article from May 22, 2014, titled “Chinese President in Veiled Warning to the US: Don't Try to '...
Tyler Drumheller Interviewee
Interviewed by the author of the book/report regarding Hong Kong.
Unnamed U.S. intelligence officer Interviewee
A former U.S. intelligence officer stationed in Hong Kong who was interviewed by the author and requested anonymity.

Timeline (6 events)

1999
Publication of a report by a Select Committee of the U.S. Congress.
N/A
December 8, 2014
Publication of an article in Bloomberg Business by David Tweed.
N/A
June 11, 2015
Publication of a New York Times article about hackers.
N/A
June 21, 2015
Publication of a Wall Street Journal article quoting Michael Hayden.
N/A
May 22, 2014
Publication of a CNS News article about a warning from the Chinese President.
N/A
September 17, 2007
Publication of a UPI article about Chinese 'zombie computers' in the U.S.
N/A
UPI Staff

Locations (4)

Location Context
Mentioned as the location of a Snowden video and the station for an interviewed U.S. intelligence officer.
Location of Chandos Publishing.
The central subject of the chapter "The Chinese Puzzle" and its associated citations.
Mentioned in relation to Chinese 'zombie computers' and a warning from the Chinese President.

Relationships (4)

Author Interviewer/Interviewee Tyler Drumheller
Citation 10 states 'Author's interview with Tyler Drumheller'.
Author Interviewer/Interviewee Unnamed U.S. intelligence officer
Citation 9 states 'Author's interview with a dormer U.S. intelligence officer'.
Citation 2 states the commission's report was 'quoted in David Tweed'.
Gerald Baker Journalist quoted a source Michael Hayden
Citation 7 is an article by Baker titled 'Michael Hayden Says U.S. Is Easy Prey for Hackers'.

Key Quotes (10)

"The first [false assumption] ..."
Source
— Snowden video in Hong Kong
HOUSE_OVERSIGHT_020423.jpg
Quote #1
"Giving China its first..."
Source
— 2014 Annual Report to Congress by the U.S.-China Economic and Security Review Commission
HOUSE_OVERSIGHT_020423.jpg
Quote #2
"Results of decades of..."
Source
— Select Committee, U.S. Congress, Report, 1999
HOUSE_OVERSIGHT_020423.jpg
Quote #3
"A vast enterprise in China..."
Source
— Nir Kshetri, The Rapidly Transforming Chinese High-Technology Industry and Market
HOUSE_OVERSIGHT_020423.jpg
Quote #4
"By 2007, Paul Strassmann..."
Source
— UPI article, "China 'has .75M zombie computers' in U.S."
HOUSE_OVERSIGHT_020423.jpg
Quote #5
"Cyber attack had harvested..."
Source
— James Lewis, "Hackers May Have Obtained Names), New York Times
HOUSE_OVERSIGHT_020423.jpg
Quote #6
"Those records are a legitimate..."
Source
— Gerald Baker, “Michael Hayden Says U.S. Is Easy Prey for Hackers," Wall Street Journal
HOUSE_OVERSIGHT_020423.jpg
Quote #7
"Any attempt to monopolize..."
Source
— Patrick Goodenough, “Chinese President in Veiled Warning to the US..."
HOUSE_OVERSIGHT_020423.jpg
Quote #8
"This mandate includes monitoring..."
Source
— Author's interview with a former U.S. intelligence officer
HOUSE_OVERSIGHT_020423.jpg
Quote #9
"Regards Hong Kong as ..."
Source
— Author's interview with Tyler Drumheller
HOUSE_OVERSIGHT_020423.jpg
Quote #10

Full Extracted Text

Complete text extracted from the document (1,427 characters)

271
CHAPTER TWENTY-TWO
The Chinese Puzzle
1. "The first [false assumption] ..."—Snowden video in Hong Kong
2. "Giving China its first..."--2014 Annual Report to Congress by the U.S.-China Economic and Security Review Commission, quoted in David Tweed, "China Takes Nuclear Weapons Undersea Away From Prying Eyes, Bloomberg Business, December 8, 2014
3. "Results of decades of..."—Select Committee, U.S. Congress, Report, 1999. http://www.house.gov/coxreport/chapfs/over.html
4. "A vast enterprise in China..."-- Nir Kshetri, The Rapidly Transforming Chinese High-Technology Industry and Market (Chandos Publishing, London) 2008. p.92
5. "By 2007, Paul Strassmann..."-- Staff, "China 'has .75M zombie computers' in U.S.," UPI, September 17, 2007
6. "Cyber attack had harvested..."-- James Lewis, "Hackers May Have Obtained Names), New York Times, June 11,2015
7. "Those records are a legitimate..."-- Gerald Baker, “Michael Hayden Says U.S. Is Easy Prey for Hackers," Wall Street Journal. June 21, 2015
8. "Any attempt to monopolize..."-- Patrick Goodenough, “Chinese President in Veiled Warning to the US: Don't Try to 'Monopolize Regional Affairs.' CNS News May 22, 2014
9. "This mandate includes monitoring..."—Author's interview with a dormer U.S. intelligence officer stationed in Hong Kong who requested anonymity.
10. "Regards Hong Kong as ..."—Author's interview with Tyler Drumheller
HOUSE_OVERSIGHT_020423

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document