Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 30-Jul-2014
30-Jul-14 World View -- Uighurs launch massive knife-wielding terrorist attack in China

Web Log - July, 2014

30-Jul-14 World View -- Uighurs launch massive knife-wielding terrorist attack in China

China's secret weapon in the South China Sea: 50,000 fishing boats

This morning's key headlines from GenerationalDynamics.com

China's secret weapon in the South China Sea: 50,000 fishing boats


Chinese fishing boats
Chinese fishing boats

As China moves into the South China Sea, annexing islands and territories that have historically belonged to other nations, and threatening anyone who tries to stop them with war, China is using, as strategic asset, 50,000 fishing boats -- from privately owned craft to commercial trawlers. Each of these boats is equipped with a satellite navigation system that gives the captain a direct link to the Chinese coast guard. In case of bad weather, or a Philippine or Vietnamese boat in waters annexed by China, he can signal the coast guard for military help. China is encouraging boat owners to fish in disputed areas historically belonging to other nations, in order to establish a claim. The reason given for Chinese assertiveness is that China's per-capita fish consumption is 35.1 kg, nearly double the global average of 18.9 kg. The UN projects that by 2030 China’s fish consumption will increase more than 60% from 2008 levels, to 57.4 million tonnes (63.3 million tons) -- more than a third of the global total.

China is aggressively asserting claims to the entire South China Sea, including regions that have historically belonged to Vietnam, Brunei, Malaysia, Indonesia, Taiwan and the Philippines. China is building a network of airstrips and military garrisons in the South China Sea in clear violation of international law, and refuses to participate in any United Nations mediation efforts. Reuters and Quartz

Uighurs launch massive knife-wielding terrorist attack in China

Dozens of knife-wielding "thugs," presumed to be Muslim Uighur separatists, conducted a "premeditated and carefully planned" attack on a government building and police station in Ailixihu, a town in China's restive northwest Xinjing province. The terrorists killed dozens of Han and Uighur civilians and destroyed 31 vehicles, presumably because of their association with the local branch of the hated Beijing government. The police killed "dozens" of the attackers.

The attack occurred on Monday, but was kept secret by Chinese authorities, who issued the following censorship instructions to the media:

"Without exception, all media must refrain from reporting on the violent terror incident in Shache County, Xinjiang."

Any news of the incident was scrubbed from the internet as soon as it was posted. However, news began to leak out to international media on Tuesday morning, and by Tuesday evening, Xinhua published a story.

There have been increasing numbers of terrorist acts by Muslim Uighurs in Xinjiang province. Chinese authorities have been doing everything possible to suppress any practice of the Muslim religion, even going so far, a month ago, of issuing orders that Uighurs are not permitted to take part in traditional fasting during the holy month of Ramadan, which ran this year from Saturday, June 28th through the evening of Monday, July 28. Uighurs were prevented from fasting in schools and public offices, and inspections were to be made on Uighur residences. The attack came on the last day of Ramadan. McClatchy and China Digital Times

China says that some Uighurs are in Syria for jihadist training

Wu Sike, China's special envoy for the Middle East, says that China is extremely worried because Uighur jihadists from Xinjiang province have gone to the Middle East for training, and may have joined the Islamic State / of Iraq and Syria (IS or ISIS) in order to join the fight in Syria or Iraq.

According to Wu:

"Several hot spot issues in the Middle East have provided living space for terrorist groups, in particular the crisis in Syria has turned this country into a training ground for extremists from many countries.

These extremists come from Islamic countries, Europe, North America and China. After being immersed in extremist ideas, when they return home they will pose a severe challenge and security risk to those countries. They won't necessarily all return (to China). Some will remain to participate in the conflict, perhaps crossing into Iraq. ...

China is a victim of extremist, terrorist activities, and our support for fighting terrorism in this region is beneficial to us too. As a result China and those countries are in a closely knit community of shared interests."

People Daily and Reuters

(Comments: For reader comments, questions and discussion, see the 30-Jul-14 World View -- Uighurs launch massive knife-wielding terrorist attack in China thread of the Generational Dynamics forum. Comments may be posted anonymously.) (30-Jul-2014) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.