Generational Dynamics: Modern Generational Theory Generational
 Modern Generational Theory


Generational Dynamics Web Log for 28-Nov-2020
28-Nov-20 World View -- Australia-China relations become more toxic through boycotts and accusations

Web Log - November, 2020

28-Nov-20 World View -- Australia-China relations become more toxic through boycotts and accusations

China's official list of 14 blunt complaints about Australia's government

by John J. Xenakis

This morning's key headlines from

Australia-China relations become more toxic through boycotts and accusations

Australian crayfish are one of the products targeted by China (9News)
Australian crayfish are one of the products targeted by China (9News)

The toxic relationship between the government of Australia and the Chinese Communist Party (CCP) has become incresingly apparent after a blunt verbal CCP attack on Australia's government, accusing it of "poisoning bilateral relations," at the same time the China is escalating its economic boycotts and blacklisting of imports from Australia.

Commenting on China's action, a CCP official said to Australian officials: "China is angry. If you make China the enemy, China will be the enemy."

On Friday, China announced 107% to 212% tariffs on wine imported from Australia. This is only the latest economic attack by China on Australia. In recent months, China has been blacklisting one Australian product after another, including lobster, cherries, beef, sugar, cotton, barley and timber. Another blacklisted import is coal. More than 50 ships have been anchored off Chinese ports for months waiting to deliver $500 million of Australian ports.

However, the most important commodity that China imports from Australia remains untouched -- the $60 billion worth of iron ore that Australia exports to China annually, and which China desperately needs.

Although these disputes have been simmering for years, China began an extremely agressive series of economic attacks on Australia in April, when Australian officials called for a joint international investigation of the origins of the coronavirus pandemic. Australia's announcement was thought to be targeting China, which has repeatedly tried to dodge responsibility for the Wuhan Coronavirus.

Earlier this year, the CCP was blaming the US army for developing the virus and somehow secretly spreading it in China's Wuhan wet markets. Lately, CCP officials have been promoting a bizarre claim that the virus originated elsewhere and arrived in China on frozen food packaging.

So an Australian call for an international investigation on the origins of the virus has brought about the CCP's usual hysterical rantings and threats and demands that everyone shut up and do as China tells them. However, this time, the CCP has backed up its hysterical rantings with the boycott of Australia's products.

The CCP has also been infuriated by Australia's criticisms of China's National Security Law, which has effectively ended the Hong Kong democracy that was supposed to last until at least 2047.

China's bribery and extortion

Bribery and extortion are the CCP's standard foreign policy tools, and China has used these tools for years to force dozens of countries to involuntarily end diplomatic relations with Taiwan. Now China is using the same techniques against a much larger country, Australia.

Australia’s former prime minister Malcolm Turnbull says that China's tactics fail will only damage China's standing abroad.

"The fundamental point is this: when someone tries to coerce you or bully you, threaten you, you can’t take a backward step.

If you do, then all that will do is invite more coercive activity. The best thing that can happen, frankly, is for this episode to come to an end, and for Australia and China to get back to a traditional, businesslike relationship.

Has it won China more influence? No. Has it won China more friends [or] persuaded other countries to be more compliant? No ... if the object of your foreign policy is, among other things, to win friends and increase your influence in the world, how is any of this helpful?"

Turnbull is saying in calm diplomatic terms the same thing that I've been saying for years: That the CCP policies are insane, and always make any situation worse.

From the point of view of Generational Dynamics, mutual relations between China and Australia have become increasingly hostile for the last few years, and as the populations of both countries are becoming increasingly nationalistic and belligerent in the generational Crisis era, this worsening situation will lead to war.

This is also a good time to respond to the frequently heard statements like, "Countries A and B will never go to war, because trade between the two countries is good, and war will be bad for business." If this were true, there would never have been a war. What actually happens is that trade does not prevent a war. Instead, trade makes the situation worse, because the stronger trading partner uses trade as one more weapon of war, as we're seeing now in the case of China and Australia.

China's official list of 14 blunt complaints about Australia's government

Last week, in another incredibly bizarre CCP move, a sheet of paper containing 14 blunt complaints about Australia's government was leaked to three Australian news agencies. In other words, these were official complaints by the CCP, but instead of notifying Australia's government directly, or instead of posting them on a web site, the Chinese Embassy called up reporters and scheduled meetings, but said nothing at the meetings except to hand over, in each case, the sheet of paper.

The list included complaints about Australia's banning Huawei's 5G routers on national security grounds, complaints about speaking out about the South China Sea, and complaints about "siding with the US" anti-China campaign.

The following is the official list of 14 complaints, as they were printed on the Embassy officials sheet of paper:

In other words, shut up and do as you're told.

National security threat of China's Huawei 5G networks

This is a good time to repeat the situation with China's 5G routers. It is absolutely certain that these routers contain "backdoors" that permit China's military not only to spy on any traffic traveling through them, but also to control them, possibly shutting down entire networks in time of war.

First off, I'm the expert on this subject, not some reporter or politician who majored in sociology or women's studies in college. I spent five years of my career developing board-level operating systems for embedded systems, so I know how easy it would be to install a "backdoor" into a device that would allow the device to be controlled remotely by China's military. Furthermore, an implementation that uses public/private key encryption technology could be designed in such a way that the backdoor could not be detected, even by someone who suspects that the backdoor is there.

I have the skills to do this fairly easily, and there are undoubtedly many Chinese engineers with the same skills. So it would be very easy for Huawei to install undetectable backdoors into all its devices, allowing the devices to be controlled by China's military. Furthermore, in 2017, the CCP passed the National Intelligence Law, which demands that all organizations, including Huawei, "support, cooperate with, and collaborate with" China's military in collecting intelligence, even when doing so is illegal. That makes it certain that Huawei's routers can be controlled remotely by China's military.

So any country or company that has installed Huawei networks and devices can be easily spied on by China's military, and the network can be controlled or shut down by China's military, for example at time of war.


Related articles:

(Comments: For reader comments, questions and discussion, see the Generational Dynamics World View News thread of the Generational Dynamics forum. Comments may be posted anonymously.) (28-Nov-2020) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2020
Web Log Summary - 2019
Web Log Summary - 2018
Web Log Summary - 2017
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2020
Web Log - November, 2020
Web Log - October, 2020
Web Log - September, 2020
Web Log - August, 2020
Web Log - July, 2020
Web Log - June, 2020
Web Log - May, 2020
Web Log - April, 2020
Web Log - March, 2020
Web Log - February, 2020
Web Log - January, 2020
Web Log - December, 2019
Web Log - November, 2019
Web Log - October, 2019
Web Log - September, 2019
Web Log - August, 2019
Web Log - July, 2019
Web Log - June, 2019
Web Log - May, 2019
Web Log - April, 2019
Web Log - March, 2019
Web Log - February, 2019
Web Log - January, 2019
Web Log - December, 2018
Web Log - November, 2018
Web Log - October, 2018
Web Log - September, 2018
Web Log - August, 2018
Web Log - July, 2018
Web Log - June, 2018
Web Log - May, 2018
Web Log - April, 2018
Web Log - March, 2018
Web Log - February, 2018
Web Log - January, 2018
Web Log - December, 2017
Web Log - November, 2017
Web Log - October, 2017
Web Log - September, 2017
Web Log - August, 2017
Web Log - July, 2017
Web Log - June, 2017
Web Log - May, 2017
Web Log - April, 2017
Web Log - March, 2017
Web Log - February, 2017
Web Log - January, 2017
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004

Copyright © 2002-2020 by John J. Xenakis.